Skip to main content

Utility

  • Blog
  • TRACE
  • Request Demo
  • Chat With Us
  • Login
Free Cyber Risk Report
  • Solutions
    • Exposure Management
      • External Attack Surface Management
      • Supply Chain Exposure
      • Cyber Threat Intelligence
    • Third-Party Risk Management
      • Continuous Monitoring & Response
      • Vendor Risk Management
      • Trust Management Hub
    • Governance & Reporting
      • Security Ratings
      • Cybersecurity Regulations
      • Executive Reporting
    • Cyber Threat Intelligence
      • Identity Intelligence & Credentials
      • Vulnerability Intelligence
      • Attack Surface Intelligence
      • Ransomware Intelligence
      • Brand & Executive Intelligence NEW
      • Bitsight Pulse: CTI News
    • Professional Services
      • Third-Party Risk Services
      • Threat Intelligence Services
    • View All
      • Industries
      • Integrations
    NEW: Free custom threat assessment

    Get a personalized view of your organization’s cyber threat exposure. See leaked credentials, vulnerability risk, and signs of attacker interest—benchmarked against peers.

    Run my threat assessment
  • Data & Research
    Trust in our data

    We combine real-time discovery of networks, assets, and vulnerabilities with our AI attribution engine and security researchers to amass one of the largest and mapped risk datasets in the world.

    • Our Data
      • Data & Insights
      • Data Correlation & Studies
      • Data Discovery
      • Data Mapping & Attribution
      • Cyber Data for Capital Markets
      • Groma Explorer: internet software observations
      • Underground Explorer: cybercrime statistics NEW
    • Our Research
      • Latest Security Research NEW
        • 2025 State of the Underground
      • Meet the TRACE Team
    Research report: State of the Underground 2025

    Cybercrime is scaling fast. Bitsight researchers expose how ransomware gangs, leaked credentials, and black-market data are reshaping global risk.

    Download report
  • Company
    • About Us
      • Our Story
      • Our Team
      • Trust Center
      • Belonging & Inclusion
      • Press Releases
    • Partner Programs
      • Moody's Partnership
      • Microsoft Partnership
      • Cyber Data for Capital Markets
    • Connect with Us
      • Careers
        • Open Positions
      • Events
      • In the news
      • Locations
      • Contact Us
    Bitsight Launches Industry’s First Dark Web Intelligence for Supply Chains, Empowering Organizations to Predict and Prevent Third-Party Exploits
    Read release
  • Resources
    • Resources
      • Customer Stories
      • Analyst Reports
      • Research
      • Product datasheets
      • Guides
      • Webinars
      • Videos
      • All Resources
    • Bitsight TRACE
      • Latest Security Research
        • 2025 State of the Underground
        • Cyber Risk in the Global Supply Chain
      • Meet the TRACE team
    • Learn
      • Blog
      • Interactive Product Tours NEW
      • Third-Party Risk Management
      • Threat Intelligence
      • Compliance
      • Cybersecurity Glossary
      • Bitsight Knowledge Base
    A Third-Party Risk Management Framework Template: 10 Critical Elements

    Discover how to build a defensible, data-driven program that enables visibility, accountability, and continuous improvement.

    Download Template
Free Cyber Risk Report
  • Blog
  • TRACE
  • Login
  • Chat With Us
  • Request Demo

Kaitlyn Graham

Articles by Kaitlyn Graham

How Do I Know if I am at Risk for a Ransomware Attack?

How Do Ransomware Attacks Happen & Spread Through Your Network

Read now
Vendor security audit

How to Conduct an Efficient and Objective Vendor Security Audit

Read now
global digital perimeter

Protect Your Digital Perimeter: Gain a Clear View of Risk Across the Attack Surface

Read now
Measuring an acceptable level of supply chain risk

What is Inherent Cyber Risk? How to Establish an Acceptable Level of Supply Chain Risk

Read now
Cyber risk data, CISO presenting about cybersecurity and cyber risk to board of directors and c-suite

How to Use Cyber Risk Data to Make Your Cybersecurity Business Case

Read now
ransomware as a service

The Rise of Ransomware-as-a-Service and Best Practices to Avoid Becoming a Victim

Read now

Pagination

  • Previous page
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Current page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Next page

BitSight Technologies, Inc.
111 Huntington Ave, Suite 400
Boston, MA 02199
United States of America

+1-617-245-0469


TermScout logo

Free Cyber Security Reports
  • Security Ratings Snapshot
  • Attack Surface Report
  • Free cyber threat assessment
  • Marsh McLennan Cyber Risk Report
  • Third-Party Vendor Risk Report
  • Get A Free Demo
  • Bitsight Academy
  • Bitsight Knowledge Base
  • Privacy Statement
  • Corporate Social Responsibility Statement
  • UK Modern Slavery Act Statement
  • Security
  • Bitsight Security Ratings Access Terms
  • Website Terms Of Use
  • Compare Bitsight
  • Cybersecurity Glossary
  • Do Not Sell or Share My Personal Information
  • Order Fulfillment Policy
Contact Us
© 2026 BitSight Technologies, Inc. and its Affiliates. All Rights Reserved.
  • Facebook
  • Instagram
  • Linkedin
  • Twitter
  • YouTube