Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![How Cyber Exposure Management Strengthens Overall Enterprise Risk Management](/sites/default/files/styles/4_3_small/public/2024/04/01/How%20Cyber%20Exposure%20Management%20Strengthens%20Overall%20Enterprise%20Risk%20Management.jpg.webp?itok=XZQH2snp)
Highlight cyber exposure management's role in risk control and urge collaboration between security experts and business leaders for improved cyber risk management.
![network security](/sites/default/files/styles/4_3_small/public/2021/11/14/Network%20Security.jpg.webp?itok=tPaFdqxG)
Network security monitoring tools are a critical component of any IT security toolkit.
![Balancing risk and compliance management](/sites/default/files/styles/4_3_small/public/2022/03/14/Risk%20vs%20Compliance.jpg.webp?itok=vdYEEA3E)
Compliance vs. Risk management. How your organization can unify its efforts to ensure cyber resilience.
![Top 5 Trends in Telecom Risk Management](/sites/default/files/styles/4_3_small/public/migration/images/top-5-trends-in-telecom-risk-management_2.jpeg.webp?itok=PnmzbAZA)
As regulations shift and providers enter new markets, the telecom industry is changing rapidly. In preparation for these changes, telecom risk management professionals must become aware of new risks on the horizon. Privacy and net neutrality laws, new kinds of cyber threats, reputational dangers, and other factors are all poised to affect telecom companies deeply in 2019.
![Do You Have What it Takes to Achieve Digital Resilience?](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1709609737.jpg.webp?itok=wbHtLeTI)
The term “digital resilience” has gained momentum over the past few years as cybersecurity threats have grown, but what does it really mean? And how can a company become digitally resilient?
![what is a whaling attack-bitsight](/sites/default/files/styles/4_3_small/public/2023/08/13/whaling%20attack-bitsight.jpeg.webp?itok=bcj1aLsn)
Whaling attacks are a form of spear phishing that target senior executives. Learn how to defend against these attacks.
![Executive performance, Cyber risk management, Ransomware hack](/sites/default/files/styles/4_3_small/public/2022/08/25/Cyber%20risk%20management%20sized.jpg.webp?itok=rhEeTBiQ)
Executive performance and cyber risk management are now inextricably linked. Learn how CISOs can help executives be more accountable for cyber risk.
![getting started with enterprise risk management software](/sites/default/files/styles/4_3_small/public/2023/06/08/getting-started-with-enterprise-risk-management-software.jpg.webp?itok=IKebtA5X)
Enterprise risk management software helps businesses monitor, manage, and mitigate many types of risk. However, procuring and implementing ERM software requires a significant investment, and choosing the solutions that are right for your business is a perennial challenge for risk management professionals.
![cyber risk management strategy](/sites/default/files/styles/4_3_small/public/2023/06/21/AdobeStock_95077045.jpeg.webp?itok=dOcaRxvr)
These are the basic steps you should take to develop an effective cyber risk management strategy.
![Cybersecurity risk taxonomy, image of four cybsersecurity professionals, two individuals on cell phones](/sites/default/files/styles/4_3_small/public/2021/12/20/Cybersecurity%20Risk%20Taxonomy%20Sized_0.jpg.webp?itok=4o1QaFz3)
What is a cybersecurity risk taxonomy and how can you use it to guide your organization’s security program and investments?
![Cybersecurity risk remediation plan, people at a conference table discussing security](/sites/default/files/styles/4_3_small/public/2022/01/03/Risk%20Remediation%20Plan%2C%20Sized.jpg.webp?itok=oE46OAzc)
Does your organization have a cybersecurity risk remediation plan? Follow these 5 tips for crafting one.
![expanding into cyber risk management](/sites/default/files/styles/4_3_small/public/2023/04/26/Steve-cyber-risk-management-min.jpg.webp?itok=_v-idgUP)
Our strategic direction is bolstered by an expanded partnership with Moody’s Corporation, enhanced Third-Party Vulnerability Detection & Response capabilities, and an improvement to our proprietary ratings algorithm.
![why vendor risk management is critical](/sites/default/files/styles/4_3_small/public/2022/12/06/3-reasons-vendor-risk-management-scaled-1-2048x1536_0.jpeg.webp?itok=R_n_b7Oi)
New outsourcing opportunities may present as you build next year’s strategy, making Vendor Risk Management (VRM) critical for three main reasons.
![risk quantification scale](/sites/default/files/styles/4_3_small/public/2022/11/21/Shutterstock_1135785197.jpg.webp?itok=-qLjy64N)
Cyber risk quantification methods can help you talk about risk in terms of business and financial impacts. Here’s how to find the right method for your organization.
![spend end of year budget](/sites/default/files/styles/4_3_small/public/2022/11/24/end%20of%20year%20budget%20spend.png.webp?itok=WDy219Ds)
Wondering how to leverage your remaining funds? As you decide how to use your end of year budget, ask yourself these questions.