Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Utilizing a continuous cyber security monitoring strategy for cybersecurity can give your security team higher visibility into your threat landscape. To get the most value when investing in continuous security monitoring you first need to understand how data can be compromised. The three main ways are:

Malware can gain entry to your network in many ways. Once malware has penetrated a network, threat actors can use it to steal information, encrypt systems, spy on users, and remove files. Learn how to prevent dangerous malware.

In 2021, ransomware attacks on government agencies globally increased by 1,885% over 2020 attacks, and the trends are continuing so far in 2022. Learn how to protect your organization from ransomware with three best practices.

Learn about the top ransomware attack vectors favored by hackers and the steps you can take to protect your organization.

Discover how Bitsight and Glass Lewis integrate cybersecurity into ESG, enhancing transparency, resilience, and trust for corporations and investors.

What impact has the ban had on US and global usage of Kaspersky? Has it been effective? A new analysis from Bitsight contains some surprising results.

The TRACE team investigated BADBOX, which is a large-scale cybercriminal operation selling off-brand Android TV boxes, smartphones, and other Android electronics with preinstalled malware.

Continuing our web app security series: explore POST requests and how logging out works with cookies and session IDs and more.

Bitsight CEO, Steve Harvey, is thrilled to announce the official closing of Bitsight’s acquisition of Cybersixgill, a leading provider of cyber threat intelligence solutions. Read the full announcement.

Security pros can now submit detailed Jira requests to admins, developers, ops teams, and collaborators directly from the Bitsight portal.

Discover insights and recommendations to help your organization stay ahead of SOC 2 as part of your overarching cybersecurity compliance strategy.

We’re pleased to preview Dynamic Remediation, a capability that makes remediated findings immediately impactful to the affected customer’s Bitsight Security Rating.

After a year long investigation, Bitsight TRACE follows up on Socks5Systemz research.

We asked the Institut Luxembourgeois de Régulation (ILR) about NIS2 and what does it mean in practice. Here are their answers.

We introduced Cybersecurity Data Feeds last year to address the needs of organizations operating at this scale. In this post, we’ll share some exciting new additions that we’ve made to this offering.