Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Bitsight and Google collaborate to reveal global cybersecurity performance
Bitsight and Google collaborate to reveal global cybersecurity performance
This joint study between Bitsight and Google arms organizations with actionable insights, providing the current status of global cybersecurity performance by analyzing nearly 100,000 global organizations across 16 cybersecurity controls and nine industries amid heightened stakeholder demands on cybersecurity strategy.
As economic pressures increase, CISOs are working more strategically with their resources and looking at the ROI of their technology investments to get the most out of their solutions. CISOs need to pay attention to three key areas when choosing which solutions to continue investing in, or how to work differently with what they have.
As digital transformation picks up pace, companies are working with more vendors than ever. According to Gartner, 60% of organizations now work with more than 1,000 third-party vendors — including partners, sub-contractors, and suppliers.
How do cyber insurers determine which organizations are going to be a risk worth taking? It’s more important than ever to continue underwriting good and opportunistic risks, while not overcorrecting for the high loss ratios the industry is seeing. Insureds need to answer two questions: what is good cyber hygiene and how do you measure it?
Cyberattacks on state and local governments are on the rise. In 2020, more than 100 government agencies, including municipalities, were targeted with ransomware – an increasingly popular attack vector.
These are the basic steps you should take to develop an effective cyber risk management strategy.
Ransomware is getting more sophisticated, and 1 in 4 breaches involve ransomware. Bitsight analyzed hundreds of ransomware events to estimate the relative probability that an organization will experience a ransomware event. Four areas bubble to the top.
Verizon’s much anticipated 2023 Data Breach Investigations Report (DBIR) is out and we have the missing pieces you need to convert its findings into action.
A vendor risk management checklist will ensure you capture relevant information from your vendors during the onboarding process. Here’s what to include.
A quick list of Apple vulnerabilities as outlined and catalogued by CISA.
When it comes to improving cybersecurity at your organization, there are some fixes that you can undertake with very little preparation. More robust remediation efforts, however, usually start with a cybersecurity risk assessment.
We look at five ways you can reduce cyber threats without putting additional pressure on stretched resources.
Third parties may have weaker security controls than the organizations they provide services to. Learn how to prevent a third party data breach.
Let’s look at how you can establish a cybersecurity baseline that works for your unique risks, industry, and business.
Does your organization have a cybersecurity risk remediation plan? Follow these 5 tips for crafting one.
Network security monitoring tools are a critical component of any IT security toolkit.