Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Bitsight and Google collaborate to reveal global cybersecurity performance
Bitsight and Google collaborate to reveal global cybersecurity performance
This joint study between Bitsight and Google arms organizations with actionable insights, providing the current status of global cybersecurity performance by analyzing nearly 100,000 global organizations across 16 cybersecurity controls and nine industries amid heightened stakeholder demands on cybersecurity strategy.
Data exfiltration is the unauthorized transfer of data from a host device, such as an application, database, or server. Here’s how you can prevent it.
Third-party vendors are a vital part of your business ecosystem. But if you’re not careful, these companies can introduce cyber risk. The SolarWinds supply chain hack is a notable example of the jeopardy that even the most trusted partnerships can yield.
Learn how to secure your expanding cybersecurity ecosystem, including your supply chain.
New research sheds light on the top emerging cybersecurity threats facing organizations. We summarize these findings and recommend mitigation actions.
What is a cyber resilience framework? Learn how your organization can better prepare for, respond to, and recover from a cyber attack.
What is a SOC 2 report and why is it essential in due diligence and vendor risk management programs? Here's what you need to know.
Learn the basic principles of Zero Trust and how to apply them to your third-party risk management program to create more secure remote access connections.
Here’s the important question: With cyber vulnerabilities rising and presenting increasingly serious risks, are organizations doing enough to fight back? The answer might surprise you.
Passwords are only as strong as we make them. Explore the findings of our research around password usage and get the top tips on password security.
Enterprises tend to take their time with remediation efforts, despite software vulnerabilities being a top threat to organizations’ cybersecurity performance. The key to quicker fixes? Timely briefings.
Software vulnerabilities are inevitable, but you can reduce their impact by acting fast. Follow these zero day remediation tips.
Learn how to mitigate supply chain attacks by improving visibility into your third-party attack surface.
A majority of boards now see cyber risk as business risk, so they’re asking hard questions around risk and exposure. Security leaders must have processes in place to inform and educate executives, boards, and stakeholders as to the security posture of the organization as well as the postures of important third parties.
Here are five questions you should ask yourself as part of your morning cybersecurity checklist that will help to protect your organization.
People’s perception of your cyber risk will outweigh its actual performance. And when trust in cybersecurity takes a nosedive, it can make a big dent in your financials. Learn how to prove protection and build trust with three key stakeholder groups.