Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Compromised credentials refer to login information that's been exposed on the deep, dark web. Learn how they happen, plus detection & mitigation strategies.

As responsibilities for cyber risk leaders grow and resources remain finite, cyber risk prioritization is vital. Learn 5 ways that CTI helps you prioritize.

Compromised credentials fuel identity threats. Bitsight's Identity Intelligence monitors the dark web, alerts you fast, and enables rapid remediation.

AI tools like DALL-E & ChatGPT went mainstream in 2022, sparking creativity—and security concerns. Explore their impact & how threat actors may exploit them.

Secure your DNS servers to enhance speed and protect against cyber threats. Learn how DNS works, its role in security, and best practices for protection.

Explore key cybersecurity data gathering techniques, from OSINT to threat intelligence feeds, to find vulnerabilities, anticipate threats, & enhance defenses.

Stealer malware (infostealer) is growing as a top avenue for identify credential theft. Learn what stealer malware is, how it works, & how to safeguard data.

The OSINT Framework assists analysts in gathering & organizing open-source information. Learn the 5 steps of OSINT, sources, tools, and how to use it.

Cybercrime is illegal activity that involves networks or digital devices. Learn about types of cybercrime including DoS attacks, supply chain attacks, & more.

Crypto fraud detection is the process of identifying & preventing fraudulent activities within cryptocurrency transactions & platforms. Learn how it works now.

In this guide, discover how digital fingerprinting identifies devices & users using unique system traits for cybersecurity, threat intel, and fraud prevention.