Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

At Bitsight, our collective observations highlight five critical areas that will shape cybersecurity strategies in 2025.

Continuing our web app security series: explore POST requests and how logging out works with cookies and session IDs and more.

How Bitsight leadership has set up and run a workable AI Council balancing innovation through the use of AI with being a cybersecurity risk management firm.

Our response to CVEs within the CUPS printing system, where several critical vulnerabilities were identified.

Is there a difference between cybersecurity vs. information security? Learn more about the distinctions between the two areas, where they overlap, and how both have evolved.

Here are five questions you should ask yourself as part of your morning cybersecurity checklist that will help to protect your organization.

Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to business, and ensure compliance.

What is cyber resilience vs. cybersecurity and why in today’s digital economy you need a plan for both.

Many organizations view parked domains as dormant, low-risk, and not worth the investment in robust security measures. This is a misconception. Here's why.

This post will focus on recent developments in Bitsight Groma.

We’re closely analyzing the cause of–and response to–the CrowdStrike global incident to better understand how organizations can understand and mitigate risk.

Let’s look at how you can establish a cybersecurity baseline that works for your unique risks, industry, and business.

Want to capture your board’s attention? Add these seven KPIs to your cybersecurity dashboard.

Every organization handles security differently, based on their needs and internal structure — but in some mid-sized and large companies, both the chief information officer (CIO) and the chief information security officer (CISO) are involved.

Bitsight's leading analytics and workflows allow investors to effectively reduce cyber risk across their portfolio. Doing so does not require cyber or technical expertise - allowing investors to focus on what they do best.