Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Cybercrime is illegal activity that involves networks or digital devices. Learn about types of cybercrime including DoS attacks, supply chain attacks, & more.

This article provides details on how Bitsight TRACE addressed CVE-2024-23897, an arbitrary file read vulnerability that affects Jenkins.

It’s every security manager's worst nightmare. A member of the IT department reaches to alert that malicious software has been detected on an internal network, and the hacker potentially has access to layers of sensitive data. In the following days and weeks of remediation, locating an access point, and reinforcing cybersecurity measures, security managers often ask themselves, “could this data leak have been prevented?”

If you operate in specific sectors, cybersecurity maturity is more than a best practice, it’s a regulatory requirement. These regulations are complex and constantly changing. To help you better understand your organization's regulatory environment and the standards and controls they stipulate, let's break down key cyber compliance regulations by industry.

Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.

You may have heard the term “digital supply chain management” being used to describe an emerging business function. But what exactly is a digital supply chain, and how is one supposed to manage it?

Utilizing a continuous cyber security monitoring strategy for cybersecurity can give your security team higher visibility into your threat landscape. To get the most value when investing in continuous security monitoring you first need to understand how data can be compromised. The three main ways are:

Malware can gain entry to your network in many ways. Once malware has penetrated a network, threat actors can use it to steal information, encrypt systems, spy on users, and remove files. Learn how to prevent dangerous malware.

SOX compliance requires companies to focus on 7 critical areas: from internal controls to cybersecurity measures. Find a full checklist for SOX compliance.

Join Ben Edwards, as he takes a brief look back at one of the stories that was most interesting to him as a security data nerd from 2024.

At Bitsight, our collective observations highlight five critical areas that will shape cybersecurity strategies in 2025.

Instant Insights for SOC 2 is a new feature that is available to Bitsight VRM customers at no additional cost. It uses advanced AI techniques to analyze and summarize SOC 2 doc and more!

Discover the biggest opportunities for enhanced risk insights on the horizon––and Bitsight's strategy for helping customers capitalize through ongoing enhancements to our data platform in 2025 and beyond.

Learn GDPR Compliance 101: Understand key principles, requirements, and steps to ensure data protection, avoid penalties, and build customer trust globally.

Understand SameSite, Same-Origin Policy, CORS, and Subresource Integrity (SRI) to enhance web security, manage cross-origin requests, and protect JavaScript.