Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![How Exposure Visibility Turbo Charges Strategic security Prioritization](/sites/default/files/styles/4_3_small/public/2024/04/23/Exposure-Visibility-security%20Prioritization.jpg.webp?itok=pLF33WbR)
With the right mindset and governance, visibility into enterprise exposures can push priorities all the way up into the strategic realm of enterprise risk management—whilst enabling a threat informed defense posture.
![Championing Supply Chain Cybersecurity Amid Evolving Regulations](/sites/default/files/styles/4_3_small/public/2024/04/16/Championing%20Supply%20Chain%20Cybersecurity%20Amid%20Evolving%20Regulations%204.png.webp?itok=Kcw6EuVo)
Explore how CISOs can secure supply chains and meet evolving cyber regulations with strategies from our new ebook on cybersecurity resilience.
![Outdated mobile apps - a ticking time bomb](/sites/default/files/styles/4_3_small/public/2024/03/29/Outdated%20mobile%20apps%20-%20a%20ticking%20time%20bomb.jpg.webp?itok=_YLz0Cn8)
Discover why millions of smartphones worldwide are at risk due to cluttered and outdated apps. Dive into our research to learn more about this critical issue.
![Vendor Due Diligence Checklist](/sites/default/files/styles/4_3_small/public/migration/images/Vendor_Due_Diligence_Checklist_31_Steps_to_Selecting_a_Third_Party_1.jpeg.webp?itok=N05-Q8fL)
The vendor due diligence checklist to steer your procurement decision-making in 5 simple steps. First step: always collect the 7 basic business details.
![Control Web Panel code](/sites/default/files/styles/4_3_small/public/2024/04/10/Control%20Web%20Panel%20code%20hero.jpg.webp?itok=cXkkvcAi)
This blog post details one of these very unique cases: `CVE-2022-44877`, an unauthenticated Command Injection issue, flagged by CISA as a Known Exploited Vulnerability (CISA KEV).
![Navigating Cybersecurity Risk Management- Aligning Stakeholder Expectations in Response to Regulations](/sites/default/files/styles/4_3_small/public/2024/04/04/Navigating%20Cybersecurity%20Risk%20Management-%20Aligning%20Stakeholder%20Expectations%20in%20Response%20to%20Regulations.jpg.webp?itok=PpUS2fDb)
Discover how executives and investors are aligning to fortify resilience in the face of evolving cyber threats.
![Why the CISO Has Become the Chief Storytelling Officer](/sites/default/files/styles/4_3_small/public/2024/04/03/Why%20the%20CISO%20Has%20Become%20the%20Chief%20Storytelling%20Officer%202.png.webp?itok=ModjCz4l)
In an era of rapid threat expansion, proper storytelling by CISOs can be the key to build confidence with customers, regulators, board members, and other stakeholders.
![RAU_Blog-hero](/sites/default/files/styles/4_3_small/public/2024/03/25/RAU_Blog-hero.png.webp?itok=YRiA5ivK)
As we announced in January, Bitsight will conduct a ratings algorithm update (RAU) on July 10, 2024, as part of our ongoing efforts to optimize our methodology to provide the best external indicator of the performance of cybersecurity controls.
![How exposure management can help CISOs benchmark their security posture against industry peers--and why thats important](/sites/default/files/styles/4_3_small/public/2024/04/05/How%20exposure%20management%20can%20help%20CISOs%20benchmark%20their%20security%20posture%20against%20industry%20peers--and%20why%20thats%20important.jpg.webp?itok=dE7ETUs4)
Dive into the realm of cybersecurity excellence, harnessing the power of exposure management and benchmarking to drive proactive resilience with peer insights.
![How Cyber Exposure Management Strengthens Overall Enterprise Risk Management](/sites/default/files/styles/4_3_small/public/2024/04/01/How%20Cyber%20Exposure%20Management%20Strengthens%20Overall%20Enterprise%20Risk%20Management.jpg.webp?itok=XZQH2snp)
Highlight cyber exposure management's role in risk control and urge collaboration between security experts and business leaders for improved cyber risk management.
![bitsight diligent study](/sites/default/files/styles/4_3_small/public/2024/03/21/bitsight-diligent-blog-banner.jpg.webp?itok=EPgmA6sx)
For the first time ever, Diligent and Bitsight have partnered to see just how well the board level effort is translating into reducing Cyber Risk for their company.
![nomura and bitsight](/sites/default/files/styles/4_3_small/public/2024/03/04/nomura-blog-min-hero.jpg.webp?itok=RavjiJP3)
Bitsight's leading analytics and workflows allow investors to effectively reduce cyber risk across their portfolio. Doing so does not require cyber or technical expertise - allowing investors to focus on what they do best.
![Common Ransomware Attack Vectors](/sites/default/files/styles/4_3_small/public/2022/01/31/Ransomware%20Attack%20Vectors%2C%20Sized.jpg.webp?itok=a5x42Rkm)
Learn about the top ransomware attack vectors favored by hackers and the steps you can take to protect your organization.
![What is an Incident Response Plan?](/sites/default/files/styles/4_3_small/public/2023/10/17/5%20Steps%20to%20Creating%20an%20Incident%20Response%20Plan.jpg.webp?itok=x1eATd2Q)
Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to business, and ensure compliance.
![Why is the Exposure Management Market So Confusing](/sites/default/files/styles/4_3_small/public/2024/03/18/Why%20is%20the%20Exposure%20Management%20Market%20So%20Confusing.jpg.webp?itok=dCCbapJM)
Discover the complexities of exposure management in the cybersecurity landscape, as we dissect the acronyms and delve into the fundamental need for better visibility into asset states.