Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

InSights Blog
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem

Gartner Predicts 2022: Cybersecurity Leaders Are Losing Control in a Distributed Ecosystem
This report from Gartner reveals cybersecurity predictions about culture, the evolution of a leader’s role, third-party exposure, and the board’s perception of cyber risk. Download the report to learn key findings, market implications, and recommendations.

Learn how to measure the financial impact of cyber attacks so you can have meaningful conversations with business leaders about risk management.

What’s the biggest struggle your vendor risk managers face when establishing cyber security monitoring processes? From sudden increases in the use of third-parties by your organization, to not knowing which vendors might be impacted by the current data breach, vendor risk managers are plagued by challenges and roadblocks that impede their program efficiency.

Gain visibility into fourth-party supplier risk, continuously monitor for emerging risks, and communicate program performance to stakeholders.

Making the best cybersecurity decisions starts with a strong foundation of data and utilizing advanced analytics to track security performance.

BitSight enables companies to create a rating based on the infrastructure that best represents their company, called a Self-Published rating, and then share it publicly as a Primary Rating

Take a look at our 2022 cybersecurity recap and trends and see what blogs our readers have been most interested in throughout the year.

Your interconnected supply chain needs trust in you, and you in them. But how can you build trust when visibility is low and resources are limited?

Traditional vendor risk management methods fail to capture new and evolving risks. Learn how a better approach to VRM can benefit your organization.

Learn the difference between third-party vs. fourth-party risk and how you can extend your risk management program to cover both.

You don’t have to be a CIO to know that a great IT department is crucial to the success of any large organization. With the rise of big data, artificial intelligence, and the Internet of Things, technology promises to become an even more fundamental part of competitive corporate strategies in every industry.

New outsourcing opportunities may present as you build next year’s strategy, making VRM critical for three main reasons.

BitSight has discovered two previously undocumented malware families named Cova and Nosu. They have different purposes and capabilities, although we found some similarities during our research.

Learn how to automate cyber risk management across your third-party ecosystem from onboarding through the life of the relationship.

While many IT, security, and risk professionals have developed good metrics and visuals for communicating internally about cyber risk, such as the safety cross and pareto charts, reporting on cybersecurity to non-technical individuals remains challenging.

A data breach can have financial, operational, and reputational impact, but how much does it actually cost?
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.