Global supply chain risk
The situation between Russia and Ukraine has been escalating since the start of January, when Russia stationed more than 100,000 troops along the Ukrainian Border. Although cyber security is not the primary concern in the current situation, there is a cyber security component that absolutely should not be overlooked.

We believe a war in the region would have a direct impact on the cyber threat landscape. Both Poland and Lithuania have recently raised their countries' alert level, just hours after Ukraine reported its defense ministry and two banks had been hacked. In the US, CISA has issued a recommendation for all organizations, regardless of size, to adopt a heightened posture when it comes to cybersecurity. Meanwhile, Russia launched a full scale attack on Ukraine territory, which is still developing, and its full reach still remains to be seen.
3 Ways To Make Your Vendor Lifecycle More Efficient
Are there parts of your third-party risk management plan that you are having a hard time adjusting to meet new needs? Are you following processes the way you are because it’s proven to be the best, or because that’s just how it’s always been done? In this guide, we introduce 3 areas third-party security professionals should consider when updating their processes and enacting efficient solutions
Port of LA, shipping container in the port
Disrupting the flow of goods and services is a keen priority for threat actors and critical infrastructure has long been a favored target. In 2021, the Colonial Pipeline ransomware attack caused a devastating impact to the economy when Russia-based hackers halted fuel movement along the critical U.S. Gulf and East Coast pipeline.

But this and other attacks may only be the beginning of an alarming ransomware trend aimed at U.S. critical infrastructure. Ransomware-as-a-service tools make ransomware easy to execute, making it the dominant cyber threat to enterprises in 2022. Indeed, the FBI recently warned that hackers have already developed ransomware code designed to disrupt critical infrastructure or industrial processes.
Good Harbor Salon: The Future of Supply Chain Cyber Risk Management After SolarWinds
BitSight partnered with Good Harbor to host a salon discussion with security leaders from various industries to hear their thoughts on what the breach means for the security industry. Hosted by Richard A Clarke and BitSight’s Stephen Boyer, the discussion covered a range of topics from what happened, to what we should learn from the event, to what needs to happen next to minimize the damage from future attacks.
Four Questions to Consider Asking Your Security Ratings Partner
Reporting has become an important topic for vendor risk managers who are managing growing outside threats to their expanding vendor pools. BitSight customers have access to a wide variety of reporting capabilities to help represent their program performance to company stakeholders. To get started with the right reports for your organization, or for information on how to better use the reports you're already using, check out our guide.