Blog Explore expert perspectives, data-driven strategies, and the latest trends in cybersecurity, third-party risk management, and cyber threat intel — all from the leader in cyber risk intelligence. Filter by: TopicsArtificial IntelligenceBitsightBitsight ResearchCompliance & RegulationsCybersecurityCyber InsuranceCyber Threat IntelligenceExposure ManagementIndustriesReporting & AnalyticsRisk ManagementSecurity RatingsThird Party Risk ManagementVendor Risk ManagementVulnerabilities & Incidents - Author -Aanenson, Aaron (2)Akay, Arzu (4)Alcon, Joel (18)Allshouse, Austin (1)Almeida, Francisco (1)Anderson, Bill (1)Arnoud, Stanislas (3)Bagcilar, Sibel (24)Barnett, Jeff (2)Batista, João (6)Becker, Sandra (1)Bilodeau, Olivia (3)Borden, Seth (1)Boyer, Stephen (14)Bumpus, Hanan (1)Burton, Andrew (13)Cadet, Carlo (2)Camelo, Pedro (1)Campanelli, Alex (45)Campbell, Chris (2)Cardoso, Nuno (1)Casion, Dave (1)Cavanaugh, Sean (10)Chamberlain, Evongelene (1)Chen, Kevin (1)Cheong, Terence (4)Cherfas, Yaniv (1)Chickowski, Ericka (2)Cisternelli, Eric (15)Cohen, Brian (1)Cruz, João (1)Dacri, Bryana (30)Dahlberg, Dan (11)David, Shir (1)Duffy, Michael (1)Edwards, Ben (13)Engineering, Bitsight (1)Fachetti, Dave (7)Fagan, Ben (22)Falé, Pedro (4)Falkowitz, Oren (3)Faria, João (3)Ferreira, Diogo (4)Ferreira, Francisco (3)Fischer, Elizabeth (1)Fonseca, Francisco (6)Freitas, Fábio (4)Gagalis, Nick (9)Gallagher, Caroline (1)Geil, Ethan (3)Gelnaw, Angela (21)Gerben, Chris (4)Gi7w0rm (1)Giaccai, Sarah (1)Gindes, Dana (1)Glórias, Paulo (1)Godinho, João (4)Gomes, Liliana (1)Goncharuk, Yevgen (1)Gosher, Dor (3)Graham, Kaitlyn (91)Grangeia, Luis (7)Grieveson, Tim (8)Grunewald, Julia (1)Habib, Cameron (1)Hadjinicolaou, Alex (1)Haroon, Maham (2)Hartzell, Matthew (1)Harvey, Steve (4)Heaslet, Abby (1)Heitsmith, Ryan (4)Hoffman, Michael (2)Holmes, Rachel (54)Hulme, George (10)Jackson, Tim (1)Jacobs, Jay (1)James, Jason (2)Jankowski, Vanessa (9)Johnson, Kim (18)Kaine, Sean (1)Kelly, John (1)Keshian, Greg (2)Klinchik, Chris (3)Kramarz, Paul (1)Lamoreaux, Jess (4)Leadership, Bitsight (1)Lei, Qionglu (4)Lerner, Dov (1)Light, Marc (1)Lopes, Nuno (1)Lourenço, Sofia (4)Luis, Sofia (8)Lux, Marco (1)Lyons, Joe (3)Majikes, John (1)Martins, Tiago (1)Matusek, Nicole (7)Mitchell, Carolyn (1)Montroy, Tom (3)Morss, Carla (2)Moyal, Oran (1)Mulligan, Brian (1)Neves, Catarina (1)Norremo, Anders (2)O'Brien, Ewen (2)Olcott, Jake (64)Oliveira, Raquel (1)O’Malley-Dertien, Kolby (1)Pacheco, Paulo (9)Pagnotta, Sabrina (77)Penkala, Ross (1)Pereira, Tiago (1)Platt, Dave (1)Potapov, Igor (1)Poulin, Chris (9)Puckett , Laura (1)Puentes, Patrick (1)Rashid, Abdullah (4)Ravanesi, Amanda (2)Reis, Miguel (1)Reish, Gabi (1)Rita, Ana (1)Roden, Kevin (1)Rosenbaum, Rich (1)Roxe, Jay (2)Salesky, Nicholas (2)Saltzman, Marc (1)Sandler, Ebin (1)Santos, Valter (1)Scharf, Ira (1)Schindlinger, Dottie (1)Shah, Samit (13)Shah, Sonali (9)Sideris, Luke (1)Silberstein, Ariela (3)Silva, Eduardo (1)Simon, Noah (30)Smith, Brandon (2)Soohoo, David (1)Stevens, Melissa (67)Stevens, Emma (38)Stone, Noah (27)Swimm, Ryan (1)Tamir, Matan (1)Tavares, André (9)Team, Bitsight (4)Tegethoff, Evan (2)Thomas, Brian (88)TRACE, Bitsight (5)Tran, Viet (3)Turner, Tom (6)Umbach, Debbie (4)Umbelino, Pedro (18)Vadala, Derek (3)Vale, Mónica (5)Vaz, Bernardo (1)Venugopal, Shyam (1)Vijayan, Jai (1)West, Scott (2)Whalen, Nick (1)Wood, Scott (3)Woodward, Mike (2)Xiong, Yitao (1)Yang, Xiaofei (1)Yusupov, Naomi (3) October 07, 2025 Featured blog Threat-Informed TPRM: A New Standard for Supply Chain Security Read blog post July 26, 2023 Exposure Management Exposure Management: Best Practices for Getting Ahead of Cyber Risk Read blog post July 26, 2023 Industries Financial Services Cybersecurity: 4 Ways to Combat Modern Threats in this Vulnerable Sector Read blog post July 25, 2023 Third Party Risk Management What is Supply Chain Risk Management? Plus, 3 Tools to Get Started Read blog post July 25, 2023 Third Party Risk Management What is Supply Chain Risk Management? Plus, 3 Tools to Get Started Read blog post July 20, 2023 Bitsight Research New research reveals rapid remediation of MOVEit Transfer vulnerabilities Read blog post July 01, 2023 Third Party Risk Management How Continuous Monitoring and Continuous Security Testing Reduce Third-Party Risk Read blog post June 20, 2023 Third Party Risk Management How to Mitigate Supply Chain Attacks Read blog post June 15, 2023 Third Party Risk Management How to Scale a Cybersecurity Program Across the Expanding Attack Surface Read blog post June 14, 2023 Third Party Risk Management How Secure is that Third Party Mobile App? Read blog post May 22, 2023 Third Party Risk Management What is Data Exfiltration? Plus, 3 Tips to Prevent It Read blog post Pagination Previous page Page 3 Page 4 Page 5 Page 6 Current page 7 Page 8 Page 9 Page 10 Page 11 Next page
Blog Explore expert perspectives, data-driven strategies, and the latest trends in cybersecurity, third-party risk management, and cyber threat intel — all from the leader in cyber risk intelligence.
October 07, 2025 Featured blog Threat-Informed TPRM: A New Standard for Supply Chain Security Read blog post
July 26, 2023 Exposure Management Exposure Management: Best Practices for Getting Ahead of Cyber Risk Read blog post
July 26, 2023 Industries Financial Services Cybersecurity: 4 Ways to Combat Modern Threats in this Vulnerable Sector Read blog post
July 25, 2023 Third Party Risk Management What is Supply Chain Risk Management? Plus, 3 Tools to Get Started Read blog post
July 25, 2023 Third Party Risk Management What is Supply Chain Risk Management? Plus, 3 Tools to Get Started Read blog post
July 20, 2023 Bitsight Research New research reveals rapid remediation of MOVEit Transfer vulnerabilities Read blog post
July 01, 2023 Third Party Risk Management How Continuous Monitoring and Continuous Security Testing Reduce Third-Party Risk Read blog post
June 15, 2023 Third Party Risk Management How to Scale a Cybersecurity Program Across the Expanding Attack Surface Read blog post
May 22, 2023 Third Party Risk Management What is Data Exfiltration? Plus, 3 Tips to Prevent It Read blog post