Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![5 Things a Security Manager Should Check Every Morning](/sites/default/files/styles/4_3_small/public/2023/04/25/5%20Things%20a%20Security%20Manager%20Should%20Check%20Every%20Morning.png.webp?itok=FUCmLgBh)
Here are five questions you should ask yourself as part of your morning cybersecurity checklist that will help to protect your organization.
![external attack surface management - bitsight](/sites/default/files/styles/4_3_small/public/2023/08/21/Attack%20surface%20-%20%20bitsight.jpeg.webp?itok=Cf5lazLD)
Your attack surface is expanding everyday. Learn how external attack surface management can help you understand what you’re up against and inform remediation.
![bitsight and moody's analytics partnership](/sites/default/files/styles/4_3_small/public/2023/04/19/Header_Moodys.png.webp?itok=jiNw4UMz)
The Moody’s Analytics supply chain, credit, insurance, compliance and investment management offerings now feature Bitsight’s leading cyber risk analytics.
![caiq sig questionnaires](/sites/default/files/styles/4_3_small/public/2023/02/07/caiq%20sig.jpg.webp?itok=BNLSCDke)
How is one questionnaire different from another, and how do you decide which ones to use in vendor risk assessments? We compare CAIQ vs. SIG.
![CIO Vs. CISO: Who Does What?](/sites/default/files/styles/4_3_small/public/migration/images/CIO%2520Vs%2520CISO%2520Who%2520Does%2520What%2520-%2520thumb_1.jpg.webp?itok=9CUQn_Nm)
Every organization handles security differently, based on their needs and internal structure — but in some mid-sized and large companies, both the chief information officer (CIO) and the chief information security officer (CISO) are involved.
![cloud security posture - bitsight](/sites/default/files/styles/4_3_small/public/2023/08/21/cloud%20security%20posture%20-%20bitsight.jpeg.webp?itok=ovEIqVbn)
As cyberattacks against cloud services and infrastructure increase, follow these best practices to improve your cloud security posture management.
![cyber threat prevention digital footprint](/sites/default/files/styles/4_3_small/public/2023/06/12/cyber%20threat%20prevention%20digital%20footprint.jpeg.webp?itok=S2oMadJ-)
We look at five ways you can reduce cyber threats without putting additional pressure on stretched resources.
![cybersecurity intelligence](/sites/default/files/styles/4_3_small/public/2023/08/03/cybersecurity%20intelligence.jpeg.webp?itok=-AuPpnQu)
Cybersecurity intelligence is a powerful weapon against risk. Learn how you can improve your cyber data collection, analysis, and sharing to mitigate emerging threats.
![Security risk management leader](/sites/default/files/styles/4_3_small/public/2022/10/28/Security%20Risk%20Management%20Leader%2C%20SIZED.jpg.webp?itok=bI6juTrc)
Cyber risk is now business risk and this means the role of the security risk management leader must be reframed. Learn how.
![cyber risk management strategy](/sites/default/files/styles/4_3_small/public/2023/06/21/AdobeStock_95077045.jpeg.webp?itok=dOcaRxvr)
These are the basic steps you should take to develop an effective cyber risk management strategy.
![How the Internet of Things Affects Your Corporate Network](/sites/default/files/styles/4_3_small/public/migration/images/Internet_of_Things_1.jpg.webp?itok=mWjp5yYf)
Almost every day there seems to be another story about the “Internet of Things" (IoT). More and more “things” are being equipped to send and receive information over the internet. It might be fun to have your running shoes connecting to the cloud, but what does it mean, if anything, to your corporate network?
![How Policymakers Can Measure Critical Infrastructure Sector Cybersecurity Performance blog image](/sites/default/files/styles/4_3_small/public/2022/09/26/How-Policymakers-Can-Measure-Critical-Infrastructure-Sector-Cybersecurity-Performance-blog.jpg.webp?itok=oBHiTS5H)
Discover the performance areas policymakers should begin measuring, why these are important and how they should collect the data.
![Cybersecurity risk remediation plan, people at a conference table discussing security](/sites/default/files/styles/4_3_small/public/2022/01/03/Risk%20Remediation%20Plan%2C%20Sized.jpg.webp?itok=oE46OAzc)
Does your organization have a cybersecurity risk remediation plan? Follow these 5 tips for crafting one.
![IoT Cybersecurity: How Your Organization Can Tame the Wild West](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1462012349_0.png.webp?itok=cnzO3Eiz)
From sensors on the factory floor to those that guide autonomous vehicles, the Internet of Things (IoT) is transforming how we live and work. Over the coming years, IoT will continue to change our world, with the number of connected devices expected to grow from 13.8 billion units in 2021 to 30.9 billion by 2025.
![security risk leader](/sites/default/files/styles/4_3_small/public/2022/10/28/Shutterstock_2079263032.jpg.webp?itok=lomJa7o9)
Learn what really keeps security and risk leaders awake at night, plus solutions they can use to maximize their security resources and better manage an expanding attack surface.