Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Bitsight and Google collaborate to reveal global cybersecurity performance
Bitsight and Google collaborate to reveal global cybersecurity performance
This joint study between Bitsight and Google arms organizations with actionable insights, providing the current status of global cybersecurity performance by analyzing nearly 100,000 global organizations across 16 cybersecurity controls and nine industries amid heightened stakeholder demands on cybersecurity strategy.
Unearth insights to not just comply but lead in the era of NIS2, DORA, PS21/3, and emerging cyber regulations.
Learn how to discover shadow IT with tools like network audits, CASB tools, and train staff to identify and manage hidden tech risks effectively.
It's proxy season, and investors want information from companies about cyber risk. Investors are leveraging Bitsight’s data analytics to better understand the risks of their investments.
Explore key insights and findings from a Bitsight/Google study on cybersecurity vulnerabilities in vendor relations, including strategies for effective third-party risk management.
Create a comprehensive policy that includes detection, reporting, and control measures to manage shadow IT.
While security ratings are a great way to demonstrate that you’re paying attention to the cyber health of the organization you also need to show that you’re adhering to industry and regulatory best practices for IT security and making informed decisions for the long-term. A cybersecurity framework can help.
Explore the impact of the SEC's new breach disclosure rules on CISOs and the crucial role of cyber exposure management in streamlining compliance and enhancing enterprise risk management.
Shadow IT risks are growing—but that’s just the tip of the iceberg when it comes to hidden risks across today’s expanding attack surface.
Bitsight's Auto Vendor Discovery empowers teams to effortlessly uncover and navigate the complexities of third-party relationships, providing invaluable insights that drive actions, mitigate risks, and ensure a healthy program.
AgentTesla (also known as OriginLogger) remains a prevalent commodity stealer, being daily distributed, mainly via email attachments
Vendor Discovery, the latest capability in Bitsight’s Third-Party Risk Management solution, instantly identifies third-party relationships.
We are rolling out a new enhanced capability with innovative techniques to improve attribution of customer and corporate infrastructure associated with IT infrastructure businesses.
Cybersecurity governance in 2023 stood out as one of the most eventful in a very long time. Here are five developments that will push CISOs and risk leaders to up their game in 2024.
As we look ahead to 2024, this is a great time to survey the damage of late to understand how enterprise risk postures need to adapt.
Here's what policymakers can do to reduce cyber risks associated with exposed industrial control systems.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.