Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

InSights Blog
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Predicts 2023: Cybersecurity Industry Focuses on the Human Deal: Gartner

Predicts 2023: Cybersecurity Industry Focuses on the Human Deal: Gartner
“By 2025, lack of talent or human failure will be responsible for over half of significant cyber incidents.” How can a human-centric design strengthen your cybersecurity program? Get your report to learn from key predictions, market implications, and recommendations.

BitSight has discovered two previously undocumented malware families named Cova and Nosu. They have different purposes and capabilities, although we found some similarities during our research.

Learn how to automate cyber risk management across your third-party ecosystem from onboarding through the life of the relationship.

While many IT, security, and risk professionals have developed good metrics and visuals for communicating internally about cyber risk, such as the safety cross and pareto charts, reporting on cybersecurity to non-technical individuals remains challenging.

A data breach can have financial, operational, and reputational impact, but how much does it actually cost?

A chief information security officer (CISO) is a senior-level executive who wears many hats in the realm of cybersecurity — but is primarily responsible for translating complex business problems into effective information security controls.

New BitSight research finds that many organizations are still affected by the OpenSSL vulnerabilities, tracked as CVE-2022-3786 and CVE-2022-3602. This blog identifies the most affected sectors and nations around the world.

In this research, we present how to manually “unpack” a sample from a recent ColibriLoader malware campaign being distributed by PrivateLoader.

Cyber risk quantification methods can help you talk about risk in terms of business and financial impacts. Here’s how to find the right method for your organization.

Wondering how to leverage your remaining funds? As you decide how to use your end of year budget, ask yourself these questions.

A study reveals the correlation between these security flaws and the likelihood of cybersecurity incidents. Learn more.

An IT security manager’s role and responsibilities can vary, but her are 9 critical functions tasked to this individual at nearly any organization.

We are constantly evolving our offerings to meet customer needs and address market shifts. Read our blog to learn about our customer-first enhancements to the BitSight for Third-Party Risk Management Platform.

Marsh McLennan, the world’s largest insurance broker, recently studied whether BitSight’s cybersecurity performance analytics are useful in understanding the likelihood of experiencing a cybersecurity incident. The findings were significant: Marsh McLennan found 14 BitSight analytics to be significantly correlated with cybersecurity incidents.

Quantitative risk assessments in cybersecurity draw on data and analytics to help you understand the probability of risk and inform strategic management decisions.

Learn what really keeps security and risk leaders awake at night, plus solutions they can use to maximize their security resources and better manage an expanding attack surface.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.