Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
An Evolved Bitsight Starts Today as We Expand into Integrated Cyber Risk Management

An Evolved Bitsight Starts Today as We Expand into Integrated Cyber Risk Management

From sensors on the factory floor to those that guide autonomous vehicles, the Internet of Things (IoT) is transforming how we live and work. Over the coming years, IoT will continue to change our world, with the number of connected devices expected to grow from 13.8 billion units in 2021 to 30.9 billion by 2025.

Dealing with unpredictable vulnerabilities is one of today's greatest challenges. What is a zero day and why is it relevant for TPRM?

Learn how to automate and streamline the process for third-party vendor risk management at financial institutions.

Presenting results is the key to showing the value of your vendor risk management efforts. These 7 reports will effectively communicate your wins.

Bitsight has identified thousands of organizations around the world using Internet-facing webcams and similar devices, finding many video and audio feeds susceptible to eavesdropping.

As the attack surface expands, vulnerability management offers a strategic approach to manage exposure and remediate on time. Here's what you need to know.

The U.S. government recently released a new National Cybersecurity Strategy, detailing recommendations and changes to ensure a safe and secure digital ecosystem. Here's our takeaways.

A quick list of Android vulnerabilities as outlined and catalogued by CISA.

The recent rise in ransomware attacks and business-halting data breaches has made it clear that your organization must prioritize cyber security performance. But ad hoc security controls and defensive measures are not the answer. Instead, you need a strategic, risk-based approach with a cyber security road map as your guide.

For the first time, cloud security breaches and incidents are more commonplace than on-premises attacks. According to the 2021 Verizon Data Breach Investigations Report (DBIR), in 2020, 73% of cyberattacks involved cloud assets, compared to only 27% in the previous year.

Learn what is inherent risk, how to measure it, and why it's a useful tool for your vendor risk management program.

Learn what three key metrics can help you create a cybersecurity board report that tells a good story and resonates with your board.

Learn what ISO 27001 controls apply to vendor risk management and how to successfully map them to your VRM framework.

Here's how to secure your digital supply chain without overburdening security and risk management teams and impeding business success.

On the surface, the Bitsight Rating and associated Risk Vectors look self-explanatory, but there's an artistic element as well. In the case of Bitsight, that means having a thorough understanding of cybersecurity and drawing inferences from the data.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.