Bitsight TRACE Report - Security Digitization and the Global Supply Chain CTA cover

security research report

Your supply chain isn’t just a series of links—it’s a vast, tangled web of dependencies, many of which have weak security. This report uncovers the critical but often-overlooked providers that could be the next cybersecurity weak spot, along with data-driven insights to help you mitigate risks before they disrupt your business.

Featured Research

CISA KEV Catalog report

Bitsight TRACE: New Security Research

Bitsight TRACE research analyzing trends and insights of the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities (KEV) Catalog. In this comprehensive report, Ben explores:

  • Prevalence of KEVs across organizations, geographies, and verticals
  • Average KEV remediation times and compliance with CISA deadlines
  • Differences in KEVs known to be part of ransomware vs other CVEs

All Research