Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Groma-blog-hero](/sites/default/files/styles/4_3_small/public/2024/07/22/Groma-blog-hero.png.webp?itok=eFdYkFmA)
This post will focus on recent developments in Bitsight Groma.
![Crowdstrike-outage-blog](/sites/default/files/styles/4_3_small/public/2024/07/19/Crowdstrike-outage-blog.png.webp?itok=aFkrdu8G)
We’re closely analyzing the cause of–and response to–the CrowdStrike global incident to better understand how organizations can understand and mitigate risk.
![nomura and bitsight](/sites/default/files/styles/4_3_small/public/2024/03/04/nomura-blog-min-hero.jpg.webp?itok=RavjiJP3)
Bitsight's leading analytics and workflows allow investors to effectively reduce cyber risk across their portfolio. Doing so does not require cyber or technical expertise - allowing investors to focus on what they do best.
![What is an Incident Response Plan?](/sites/default/files/styles/4_3_small/public/2023/10/17/5%20Steps%20to%20Creating%20an%20Incident%20Response%20Plan.jpg.webp?itok=x1eATd2Q)
Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to business, and ensure compliance.
![5 Cyber Governance Tips for Board Members, Inspired by New Bitsight-Google Study](/sites/default/files/styles/4_3_small/public/2024/01/08/5%20Cyber%20Governance%20Tips%20for%20Board%20Members%2C%20Inspired%20by%20New%20Bitsight-Google%20Study.png.webp?itok=BebjWlvZ)
Bitsight put together 5 tips for board members to manage cyber risk going into 2024. Read the blog to see how the modern corporate board thinks about cyber risk.
![Market-Changing Research Reveals Link Between Strong Cybersecurity and Stock Price](/sites/default/files/styles/4_3_small/public/migration/images/Screen%2520Shot%25202020-10-05%2520at%25204.45.59%2520PM_1.png.webp?itok=Rn5bpNED)
One of the biggest questions in cybersecurity now has an answer… and the implications are significant for investors, policymakers, corporate executives, and cybersecurity professionals alike.
![a man sits at his desk reading reports on several monitors to help detect shadow it](/sites/default/files/styles/4_3_small/public/2024/01/27/How-to-Detect-Shadow-IT_Image%20%281%29.png.webp?itok=_piDra7C)
Learn how to discover shadow IT with tools like network audits, CASB tools, and train staff to identify and manage hidden tech risks effectively.
![4 Common Retail Security Threats (and How to Stop Them)](/sites/default/files/styles/4_3_small/public/migration/images/2.%2520retail%2520gift%2520card_1.jpg.webp?itok=gl24d1uS)
The retail industry has always been a favorite target of cyber criminals. We all remember major data breaches like those that affected Target, TJX, and Home Depot — but the truth is that retail security threats have been a daily concern of retailers for a long time.
![5 Essential Elements of a Municipal Cyber Security Plan](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1869191218.jpg.webp?itok=IOSHTpoi)
Cyberattacks on state and local governments are on the rise. In 2020, more than 100 government agencies, including municipalities, were targeted with ransomware – an increasingly popular attack vector.
![4 Ways to Minimize the Risk of a Third-Party Data Breach](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_739310431_1.jpg.webp?itok=UgdfAYOf)
Today, 59% of data breaches originate with third-party vendors. And, as globalization brings more interconnected supply chains, that number is anticipated to grow.
![network segmentation cybersecurity](/sites/default/files/styles/4_3_small/public/2021/11/14/network%20segmentation.jpg.webp?itok=t0gFhE3B)
These days, we often hear the word “quarantine” in everyday conversations--but quarantining takes on a different meaning when it comes to protecting your network.
Often, when we discuss quarantining from a cyber security perspective we’re referring to network segmentation cyber security. But what is network segmentation, and is it the right approach for your organization? The answer to the first part is easy. The second is a bit more complicated.
Often, when we discuss quarantining from a cyber security perspective we’re referring to network segmentation cyber security. But what is network segmentation, and is it the right approach for your organization? The answer to the first part is easy. The second is a bit more complicated.
![5 Things a Security Manager Should Check Every Morning](/sites/default/files/styles/4_3_small/public/2023/04/25/5%20Things%20a%20Security%20Manager%20Should%20Check%20Every%20Morning.png.webp?itok=FUCmLgBh)
Here are five questions you should ask yourself as part of your morning cybersecurity checklist that will help to protect your organization.
![Bitsight Delivers Enhanced Analytics on IT Infrastructure Service Providers](/sites/default/files/styles/4_3_small/public/2024/01/07/Bitsight%20Delivers%20Enhanced%20Analytics%20on%20IT%20Infrastructure%20Service%20Providers%202-min.jpg.webp?itok=hFnAs1RR)
We are rolling out a new enhanced capability with innovative techniques to improve attribution of customer and corporate infrastructure associated with IT infrastructure businesses.
![5 Compliance and Governance Happenings That Will Drive Exposure Management in 2024](/sites/default/files/styles/4_3_small/public/2024/01/04/5%20Compliance%20and%20Governance%20Happenings%20That%20Will%20Drive%20Exposure%20Management%20in%202024.jpg.webp?itok=SCgvZR0d)
Cybersecurity governance in 2023 stood out as one of the most eventful in a very long time. Here are five developments that will push CISOs and risk leaders to up their game in 2024.
![Analyzing the Biggest Cybersecurity Exposure and Threat Events from 2023](/sites/default/files/styles/4_3_small/public/2024/01/04/Analyzing%20the%20Biggest%20Cybersecurity%20Exposure%20and%20Threat%20Events%20from%202023.png.webp?itok=KSU59EAA)
As we look ahead to 2024, this is a great time to survey the damage of late to understand how enterprise risk postures need to adapt.