Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
A majority of boards now see cyber risk as business risk, so they’re asking hard questions around risk and exposure. Security leaders must have processes in place to inform and educate executives, boards, and stakeholders as to the security posture of the organization as well as the postures of important third parties.
People’s perception of your cyber risk will outweigh its actual performance. And when trust in cybersecurity takes a nosedive, it can make a big dent in your financials. Learn how to prove protection and build trust with three key stakeholder groups.
Researchers from Bitsight and Curesec have jointly discovered a high-severity vulnerability — tracked as CVE-2023-29552 — in the Service Location Protocol (SLP).
As the world adjusts to more working from home, IT teams worked overtime to enable remote access for millions of employees.
Our strategic direction is bolstered by an expanded partnership with Moody’s Corporation, enhanced Third-Party Vulnerability Detection & Response capabilities, and an improvement to our proprietary ratings algorithm.
We have made several adjustment to continue to provide Bitsight users with the best external indicator of the performance of cybersecurity controls.
The Moody’s Analytics supply chain, credit, insurance, compliance and investment management offerings now feature Bitsight’s leading cyber risk analytics.
With the launch of Bitsight Third-Party Vulnerability Response, we are making it easier for organizations to initiate vendor outreach and track responses to critical vulnerabilities.
To be effective as a security leader you must find ways to help your SOC teams improve cyber vulnerability awareness and time to remediate. Let’s explore how.
At the upcoming RSA Conference, Bitsight’s Derek Vadala will moderate a panel to explain new cybersecurity disclosure requirements and how timely, consistent, and informative disclosure can benefit companies in the marketplace.
What risks do mobile apps present to your business and how can you get ahead of these threats?
Are you aware of the risks involved in doing business with parties sanctioned by the Office of Financial Assets Control (OFAC)?
In today’s ever changing cyber risk landscape, your organization must adopt a vulnerability management framework to control exposure and remediate risks in a timely manner.
The threat of ransomware has been increasingly prevalent, especially within the high-stakes industries like healthcare and those involved in the election.
Learn how to scale your cybersecurity program with automation, continuous monitoring, and powerful data insights.