Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Bitsight identifies nearly 100,000 exposed industrial control systems

Bitsight identifies nearly 100,000 exposed industrial control systems
Bitsight has identified nearly 100,000 exposed industrial control systems (ICS) owned by organizations around the world, potentially allowing an attacker to access and control physical infrastructure such as power grids, traffic light systems, security and water systems, and more.

Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats.

What is adaptive security? Explore the benefits of this approach to cyber risk reduction and how your organization can get started.

Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to business, and ensure compliance.

Open port vulnerabilities can increase cyber risk exposure. Learn what they are and how you can quickly find and fix them.

As cyberattacks against cloud services and infrastructure increase, follow these best practices to improve your cloud security posture management.

Your attack surface is expanding everyday. Learn how external attack surface management can help you understand what you’re up against and inform remediation.

As cyber threats evolve and business models change, maintaining a mature cybersecurity program can be challenging. You need to be confident that your organization’s current security tools and techniques are effective.

Cybersecurity intelligence is a powerful weapon against risk. Learn how you can improve your cyber data collection, analysis, and sharing to mitigate emerging threats.

If your organization is like many others, its cyber exposure continues to grow over time. During the pandemic, as attackers sought to exploit unprecedented changes in work environments, 35% of cyberattacks used previously unseen malware or methods, up from the norm of 20%. And with the average enterprise using well over 1,000 cloud services, it can be very difficult to get a handle on potential vulnerabilities or to know when risks will pop up.

The financial services sector is one of the highest performing in terms of cybersecurity. One factor that contributes to this performance is regulation.

Bitsight & Diligent launch extension partnership focused on correlated, independent, & comparable cyber ratings within Diligent’s Board Reporting for IT Risk.

As cyber security threats proliferate, cyber risk conversations are no longer limited to the Security Operations Center (SOC); they command the attention of the C-suite and the boardroom.

A cybersecurity risk analysis takes the guesswork out of analyzing performance and setting security program goals, here are three metrics to include.

These are the basic steps you should take to develop an effective cyber risk management strategy.

Ransomware is getting more sophisticated, and 1 in 4 breaches involve ransomware. Bitsight analyzed hundreds of ransomware events to estimate the relative probability that an organization will experience a ransomware event. Four areas bubble to the top.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.