Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.
In an era of rapid threat expansion, proper storytelling by CISOs can be the key to build confidence with customers, regulators, board members, and other stakeholders.
As we announced in January, Bitsight will conduct a ratings algorithm update (RAU) on July 10, 2024, as part of our ongoing efforts to optimize our methodology to provide the best external indicator of the performance of cybersecurity controls.
Vendor Risk Management is the practice of evaluating business partners, suppliers, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is an important concept and practice to put in place during the evaluation of your vendors and the procurement process.
Developing a VRM plan from scratch or looking to scale your existing program? Here are some cybersecurity IT risk assessment templates to help you get started.
Dive into the realm of cybersecurity excellence, harnessing the power of exposure management and benchmarking to drive proactive resilience with peer insights.
Highlight cyber exposure management's role in risk control and urge collaboration between security experts and business leaders for improved cyber risk management.
Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.
Today’s opportunistic hackers are seasoned professionals who are getting more adept at exploiting your organization’s digital attack surface. To do this they employ a variety of attack vectors.
Delivering medical services involves hundreds of third-party vendors. We explore the criticality of healthcare vendor risk management and how organizations can overcome common challenges.
For the first time ever, Diligent and Bitsight have partnered to see just how well the board level effort is translating into reducing Cyber Risk for their company.
Bitsight's leading analytics and workflows allow investors to effectively reduce cyber risk across their portfolio. Doing so does not require cyber or technical expertise - allowing investors to focus on what they do best.
Learn about the top ransomware attack vectors favored by hackers and the steps you can take to protect your organization.
As the world adjusts to more working from home, IT teams worked overtime to enable remote access for millions of employees.
You may have heard the term “digital supply chain management” being used to describe an emerging business function. But what exactly is a digital supply chain, and how is one supposed to manage it?
Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to business, and ensure compliance.