Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Navigating NIS2 Requirements- Transforming Supply Chain Security](/sites/default/files/styles/4_3_small/public/2024/06/05/Navigating%20NIS2%20Requirements-%20Transforming%20Supply%20Chain%20Security.png.webp?itok=ajiDJ62o)
The NIS2 Directive recognizes this and has placed a significant emphasis on supply chain security. But what does this mean for your organization? Let’s break it down.
![Person reviewing proxy reports](/sites/default/files/styles/4_3_small/public/2023/06/01/Proxy%2C%20SIZED.jpg.webp?itok=j-cjxUtj)
It's proxy season, and investors want information from companies about cyber risk. Investors are leveraging Bitsight’s data analytics to better understand the risks of their investments.
![Australia parliament](/sites/default/files/styles/4_3_small/public/2024/03/07/Australia-parliament.jpg.webp?itok=lekSX6OB)
Explore the concerning cybersecurity landscape in Australia's finance sector, marked by major data breaches and deficiencies in notification procedures, highlighting critical vulnerabilities and pressing challenges.
![Cybersecurity Frameworks to Reduce Cyber Risk](/sites/default/files/styles/4_3_small/public/migration/images/7%2520Cybersecurity%2520Frameworks%2520To%2520Reduce%2520Cyber%2520Risk_Banner_1.jpg.webp?itok=dWoU66xM)
While security ratings are a great way to demonstrate that you’re paying attention to the cyber health of the organization you also need to show that you’re adhering to industry and regulatory best practices for IT security and making informed decisions for the long-term. A cybersecurity framework can help.
![Blog_Compliance ebook-blog-hero](/sites/default/files/styles/4_3_small/public/2024/01/31/Blog_Compliance%20ebook-blog-hero.png.webp?itok=1Hb1bmDp)
Unearth insights to not just comply but lead in the era of NIS2, DORA, PS21/3, and emerging cyber regulations.
![3 Steps Government Policymakers Can Take to Reduce Critical Infrastructure Cyber Attacks](/sites/default/files/styles/4_3_small/public/2023/12/20/3%20Steps%20Government%20Policymakers%20Can%20Take%20to%20Reduce%20Critical%20Infrastructure%20Cyber%20Attacks.jpg.webp?itok=LtX6kLqo)
Here's what policymakers can do to reduce cyber risks associated with exposed industrial control systems.
![mitre system of trust](/sites/default/files/styles/4_3_small/public/2023/05/29/mitre%20system%20of%20trust.jpeg.webp?itok=-JjFmAtt)
Learn how the System of Trust framework can help you understand and address supply chain risks.
![EU Offices Belgium](/sites/default/files/styles/4_3_small/public/2023/08/25/EU%20Offices%20Belgium.jpg.webp?itok=y4HL-QSV)
To ensure the security & resilience of critical infrastructure & digital services, the EU introduced the Directive (UE) 2022/2555 (NIS 2). See how Bitsight can help.
![OFAC sanctions vendor risk management](/sites/default/files/styles/4_3_small/public/2023/01/04/OFAC-sanctions-vendor-risk-management.jpg.webp?itok=1q_CK2jx)
Are you aware of the risks involved in doing business with parties sanctioned by the Office of Financial Assets Control (OFAC)?
![CISO strategies for compliance](/sites/default/files/styles/4_3_small/public/2023/11/29/CISO%20strategies%20for%20compliance.jpeg.webp?itok=F5ln_W3G)
With compliance deadlines approaching, where should CISOs start? Bitsight experts share five strategies to navigate the complexities of cyber regulations.
![security ratings supercharge compliance](/sites/default/files/styles/4_3_small/public/2023/11/16/security%20ratings%20supercharge%20compliance_1.jpeg.webp?itok=8oy3OkDQ)
Amid a rise in regulatory pressure for cybersecurity leaders in Europe, with DORA and NIS2 as the most recent examples, cyber risk analytics emerge as an instrumental tool in ensuring compliance. Here's why.
![BitSight + Glass Lewis](/sites/default/files/styles/4_3_small/public/2023/09/13/Bitsight-and-Glass-Lewis.png.webp?itok=I-6CfQr9)
A strong, collaborative, and informed relationship between the Chief Information Security Officer (CISO) and the Board of Directors is essential for maintaining a robust cybersecurity program.
![critical security controls](/sites/default/files/styles/4_3_small/public/2021/11/14/shutterstock_1760911889.jpg.webp?itok=Sb5eM3Ws)
As cyber threats evolve and business models change, maintaining a mature cybersecurity program can be challenging. You need to be confident that your organization’s current security tools and techniques are effective.
![Independent benchmarking for SEC disclosure strategy](/sites/default/files/styles/4_3_small/public/2023/08/03/Benchmarking%20data%20SEC%2C%20SIZED.jpeg.webp?itok=o0UYIR-0)
What exactly is a “material” cybersecurity incident as defined in the latest SEC cybersecurity disclosure requirements? Let's find out.
![Top 5 Trends in Telecom Risk Management](/sites/default/files/styles/4_3_small/public/migration/images/top-5-trends-in-telecom-risk-management_2.jpeg.webp?itok=PnmzbAZA)
As regulations shift and providers enter new markets, the telecom industry is changing rapidly. In preparation for these changes, telecom risk management professionals must become aware of new risks on the horizon. Privacy and net neutrality laws, new kinds of cyber threats, reputational dangers, and other factors are all poised to affect telecom companies deeply in 2019.