Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

InSights Blog
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem

Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem
This report from Gartner reveals cybersecurity predictions about culture, the evolution of a leader’s role, third-party exposure, and the board’s perception of cyber risk. Download the report to learn key findings, market implications, and recommendations.

Security questionnaire automation can save time and reduce errors in your vendor risk management program. Learn how to quickly implement it at scale.

While many organizations look at cyber insurance as a way to transfer risk and mitigate financial losses, the assessment process used by cyber insurers can help shape your security program for the better.

BitSight is partnering with Google Cloud to provide customers with a centralized repository of Google Cloud questionnaires, certifications, and documentation, now available through BitSight Vendor Risk Management. Learn more about the partnership in our blog.

These 14 cybersecurity analytics can help you make better cyber insurance decisions for underwriters, insurance buyers, and security professionals.

Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.

Third-party vendors need to be properly evaluated before entering your data ecosystem. Use these questions in your vendor risk management program.

A quick list of Apple vulnerabilities as outlined and catalogued by CISA.

Your vendors’ vendors can pose significant cyber risk to your organization. Learn more about fourth-party risk and how to manage it.

We explore the most common security questionnaires and how to integrate them into your overall VRM process.

These questions will help you choose the best VRM tool that will take your program to the next level.

HTTP redirects are a common technique to ensure website visitors see the same content when they type different, yet related, domains in the URL bar of their browser. But any connection to an HTTP site comes with risk.

Learn how to centralize, automate, and streamline your VRM process to manage hundreds of vendors as effectively as you manage ten.

BitSight teamed with Moody’s Investors Service to discuss the cybersecurity trends to watch in 2023 and how security leaders can adapt their programs to increase preparedness.

Cybersecurity threats targeting operational technology (OT) present costly challenges for organizations globally. Learn why BitSight partnered with Schneider Electric to bring customers enhanced Industrial Control System (ICS) detection capabilities. Read more.

Vendor Risk Management is the practice of evaluating business partners, suppliers, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is an important concept and practice to put in place during the evaluation of your vendors and the procurement process.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.