Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Navigating NIS2 Requirements- Transforming Supply Chain Security](/sites/default/files/styles/4_3_small/public/2024/06/05/Navigating%20NIS2%20Requirements-%20Transforming%20Supply%20Chain%20Security.png.webp?itok=ajiDJ62o)
The NIS2 Directive recognizes this and has placed a significant emphasis on supply chain security. But what does this mean for your organization? Let’s break it down.
![7 Types of exposures to manage beyond CVEs hero](/sites/default/files/styles/4_3_small/public/2024/06/04/7%20Types%20of%20exposures%20to%20manage%20beyond%20CVEs%20hero.png.webp?itok=_EINAV82)
The following are seven types of exposures that security teams should seek to manage beyond CVEs.
![A Quantitative Look at KEV Prevalence Across Europe](/sites/default/files/styles/4_3_small/public/2024/05/30/A%20Quantitative%20Look%20at%20KEV%20Prevalence%20Across%20Europe.png.webp?itok=GCetQHgG)
Discover key differences in KEV prevalence across Europe and how they impact cybersecurity strategies in this detailed blog.
![Ivanti EPM Cloud Services Appliance - Taking advantage of a backdoor to detect a vulnerability hero](/sites/default/files/styles/4_3_small/public/2024/05/22/Ivanti%20EPM%20Cloud%20Services%20Appliance%20-%20Taking%20advantage%20of%20a%20backdoor%20to%20detect%20a%20vulnerability%20hero.jpeg.webp?itok=YbNKZw7d)
This blog post details how `CVE-2021-44529` was researched as well as the current method being used to detect it.
![Person reviewing proxy reports](/sites/default/files/styles/4_3_small/public/2023/06/01/Proxy%2C%20SIZED.jpg.webp?itok=j-cjxUtj)
It's proxy season, and investors want information from companies about cyber risk. Investors are leveraging Bitsight’s data analytics to better understand the risks of their investments.
![Integrating your TPRM Stack for Seamless Vendor Lifecycle Management](/sites/default/files/styles/4_3_small/public/2024/03/07/Integrating%20your%20TPRM%20Stack%20for%20Seamless%20Vendor%20Lifecycle%20Management.jpg.webp?itok=io6e_kXK)
Cybersecurity teams face mounting pressure to optimize resources and secure complex digital supply chains. Discover a new, integrated solution to automate vendor risk assessments and leverage comprehensive cyber risk data for streamlined TPRM.
![The Race to Secure Operational Technologies is On](/sites/default/files/styles/4_3_small/public/2024/05/21/The%20Race%20to%20Secure%20Operational%20Technologies%20is%20On.jpg.webp?itok=emcvwIRC)
Attacks targeting operational technology & industrial control systems are rising while many cut security budgets. Comprehensive strategies and monitoring are essential now more than ever.
![Analyzing Utilities Sector Cybersecurity Performance](/sites/default/files/styles/4_3_small/public/migration/images/bigstock-High-voltage-Power-Lines-Ele-283705351_1.jpg.webp?itok=GT8Rcaqe)
With economic sanctions being levied by the US against Iran and a trade war heating up with China, some security experts are cautioning that attacks targeting US critical infrastructure may be inevitable. Are electric utilities prepared to defend themselves and their facilities against these attacks?
![Forrester blog banner](/sites/default/files/styles/4_3_small/public/2024/05/20/Forrester%20blog%20banner%20930x527.png.webp?itok=_7Yv8xTr)
Bitsight was named a Leader in The Forrester Wave: Cybersecurity Risk Ratings Platforms, Q2 2024 for a third consecutive time.
![AI image of a duck on the porch of a farmhouse with a man in black lurking in the shaddows](/sites/default/files/styles/4_3_small/public/2024/05/15/xz_header.png.webp?itok=v8LKPUub)
Dive into a significant cybersecurity scare that could have led to widespread chaos, highlighting the vulnerabilities that were exposed and the swift actions taken to prevent disaster.
![The relationship between cyber risk financial quantification and exposure management](/sites/default/files/styles/4_3_small/public/2024/05/14/The%20relationship%20between%20cyber%20risk%20financial%20quantification%20and%20exposure%20management.png.webp?itok=8z4tHWMX)
Security leaders have got to be ready to direct the conversation on security in a manner that resonates with directors. Here's how.
![9 Critical Responsibilities of an IT Security Manager](/sites/default/files/styles/4_3_small/public/migration/images/9_Critical_Responsibilities_Of_The_Cybersecurity_Manager_-_thumb_1.jpg.webp?itok=_DsRh6uN)
An IT security manager’s role and responsibilities can vary, but her are 9 critical functions tasked to this individual at nearly any organization.
![Board Exposure Management](/sites/default/files/styles/4_3_small/public/2024/04/26/board-exposure-management-min.jpg.webp?itok=xARpf3y4)
Here are some key tips for presenting the outcomes tracked by exposure management in a way that will be most helpful to the board and business stakeholders.
![Blog Image KEV Research Announcement](/sites/default/files/styles/4_3_small/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png.webp?itok=bNsxi75a)
Bitsight’s global, advanced scanning and detection capabilities provide insight into many actively exploited vulnerabilities that others just can’t touch. Explore how we do it.
![email security with DMARC](/sites/default/files/styles/4_3_small/public/2024/04/29/Enabling%20More%20Precise%20Evaluation%20of%20Email%20Security%20with%20DMARC-min.jpg.webp?itok=CH6N2R84)
Email is a well-known and widely used attack vector for malware distribution, phishing, and many other types of threats.