Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Third-party risks and threats are dynamic, and your TPRM program should be, too. Learn the benefits of integrating cyber threat intelligence into TPRM.

Vendor Risk Management is the practice of evaluating business partners, suppliers, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is an important concept and practice to put in place during the evaluation of your vendors and the procurement process.

The NIS2 Directive marks a significant shift in how the EU is addressing cyber risks, reinforcing security requirements for organizations and their suppliers. But what does this mean for businesses operating in Europe?

Bitsight's Critical Asset Management makes it easy to target specific third-party cyber assets for continuous monitoring, individually or in bulk. Learn more.

Third party risk management is trending following major data breaches affecting organizations through their vendors. But what is TPRM?

You may have heard the term “digital supply chain management” being used to describe an emerging business function. But what exactly is a digital supply chain, and how is one supposed to manage it?

Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.

Utilizing a continuous cyber security monitoring strategy for cybersecurity can give your security team higher visibility into your threat landscape. To get the most value when investing in continuous security monitoring you first need to understand how data can be compromised. The three main ways are:

Learn about the top ransomware attack vectors favored by hackers and the steps you can take to protect your organization.

Some practical examples of how Bitsight customers are finding quick wins with Trust Management Hub an effective governance, risk, and compliance (GRC) program.

The recent rise in ransomware attacks and business-halting data breaches has made it clear that your organization must prioritize cyber security performance. But ad hoc security controls and defensive measures are not the answer. Instead, you need a strategic, risk-based approach with a cyber security road map as your guide.

Learn how to protect your organization’s “crown jewels” with these do’s and don’ts of sensitive data sharing with vendors.

What is cyber resilience vs. cybersecurity and why in today’s digital economy you need a plan for both.

We will focus on understanding a very specific NIS2 requirement: Coordinated Risk Assessments. Let’s explore what that means.

How do you determine who is a 'critical supplier'? Delve into practical strategies to identify crucial partners and ensure compliance with NIS2 requirements.