Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

InSights Blog
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem

Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem
This report from Gartner reveals cybersecurity predictions about culture, the evolution of a leader’s role, third-party exposure, and the board’s perception of cyber risk. Download the report to learn key findings, market implications, and recommendations.

Security questionnaire automation can save time and reduce errors in your vendor risk management program. Learn how to quickly implement it at scale.

BitSight is partnering with Google Cloud to provide customers with a centralized repository of Google Cloud questionnaires, certifications, and documentation, now available through BitSight Vendor Risk Management. Learn more about the partnership in our blog.

Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.

Your vendors’ vendors can pose significant cyber risk to your organization. Learn more about fourth-party risk and how to manage it.

These questions will help you choose the best VRM tool that will take your program to the next level.

Learn how to centralize, automate, and streamline your VRM process to manage hundreds of vendors as effectively as you manage ten.

Vendor Risk Management is the practice of evaluating business partners, suppliers, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is an important concept and practice to put in place during the evaluation of your vendors and the procurement process.

Cybersecurity threats targeting operational technology (OT) present costly challenges for organizations globally. Learn why BitSight partnered with Schneider Electric to bring customers enhanced Industrial Control System (ICS) detection capabilities. Read more.

What’s the biggest struggle your vendor risk managers face when establishing cyber security monitoring processes? From sudden increases in the use of third-parties by your organization, to not knowing which vendors might be impacted by the current data breach, vendor risk managers are plagued by challenges and roadblocks that impede their program efficiency.

Gain visibility into fourth-party supplier risk, continuously monitor for emerging risks, and communicate program performance to stakeholders.

Your interconnected supply chain needs trust in you, and you in them. But how can you build trust when visibility is low and resources are limited?

Learn the difference between third-party vs. fourth-party risk and how you can extend your risk management program to cover both.

Learn how to automate cyber risk management across your third-party ecosystem from onboarding through the life of the relationship.

Wondering how to leverage your remaining funds? As you decide how to use your end of year budget, ask yourself these questions.

A study reveals the correlation between these security flaws and the likelihood of cybersecurity incidents. Learn more.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.