Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
![Critical Vulnerabilities Discovered in Automated Tank Gauge Systems](png/critical%20vulnerabilities%20discovered%20in%20automated%20tank%20gauge%20systems10e5.png?itok=P_4HIbmY)
Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.
![Four Ways to Streamline Your Security Review Process](webp/four%20ways%20to%20streamline%20your%20security%20review%20process-hero.png904b.webp?itok=Sdxi8hOS)
Some practical examples of how Bitsight customers are finding quick wins with Trust Management Hub an effective governance, risk, and compliance (GRC) program.
![Web Application Security for DevOps Part 2](webp/web%20application%20security%20for%20devops%20part%202.png44d2.webp?itok=1TtorR25)
This is a continuation of the series on web application security where we dive into cookie dynamics.
![Exfiltration over Telegram Bots- Skidding Infostealer Logs](webp/exfiltration%20over%20telegram%20bots-%20skidding%20infostealer%20logs.png3d65.webp?itok=k6qaZMbx)
Bitsight’s visibility over infostealer malware which exfiltrates over Telegram suggests that the most infected countries are the USA, Turkey, and Russia, followed by India and Germany.
![Blog Forrester TEI](webp/blog%20placeholder%20%20forrester%20tei%20v3.png62a4.webp?itok=tVsRMZ4Y)
We commissioned Forrester Consulting to conduct a 2024 Total Economic Impact™(TEI) Of Bitsight study. Explore research on the financial impact that a typical organization can achieve with Bitsight.
![Field CISOs_Web Application Security](webp/blog_field%20cisos_web%20application%20security%201%20hero.png4110.webp?itok=saaDpYG_)
This blog starts with the basics as part of a series regarding operational security, such as web application headers and defenses against attacks such as cross-site scripting (XSS), cross-site request forgery (CSRF), and vulnerabilities in included libraries.
![Bitsight ai council](webp/bitsight-ai-council.png17a5.webp?itok=HfEiJcgj)
How Bitsight leadership has set up and run a workable AI Council balancing innovation through the use of AI with being a cybersecurity risk management firm.
![Critical Vulnerabilities Uncovered- How Bitsight Delivered Fast Actionable Insights in Under 24 Hours](webp/critical%20vulnerabilities%20uncovered-%20how%20bitsight%20delivered%20fast%20actionable%20insights%20in%20under%2024%20hours%20.png0aa4.webp?itok=XKZgF1pn)
Our response to CVEs within the CUPS printing system, where several critical vulnerabilities were identified.
![Critical Vulnerabilities Discovered in Automated Tank Gauge Systems](webp/critical%20vulnerabilities%20discovered%20in%20automated%20tank%20gauge%20systems.png5185.webp?itok=UepO5tGe)
Recent investigation by Bitsight TRACE has discovered multiple critical 0-day vulnerabilities across six ATG systems from five different vendors.
![From Theory to Practice- How Portugal's Cybersecurity Centre is Tackling NIS2 Compliance](webp/from%20theory%20to%20practice-%20how%20portugal%27s%20cybersecurity%20centre%20is%20tackling%20nis2%20compliance.jpg169a.webp?itok=OUAq7Vh9)
In this Q&A, CNCS shares valuable insights into the challenges, requirements, and best practices surrounding NIS2 compliance.
![Examining CISA KEV Performance in the Financial Sector](webp/cisa-kev-performance-in-the-financial-sector.pngd7c4.webp?itok=aV80Jo4w)
I’ve had a number of requests to examine the finance sector in more detail including breakdowns of exactly what kind of financial organizations are experiencing greater risk and who is remediating more quickly. Here's some answers.
![Information available for companies with Delegated Security Controls hero](webp/information%20available%20for%20companies%20with%20delegated%20security%20controls%20hero.png6dc9.webp?itok=Dyqdlls6)
We dive deeper into a specific area where asset attribution can be particularly nuanced: assessing service providers’ security posture.
![ssvc hero](webp/ssvc-hero.pngd612.webp?itok=575gZ5bz)
Want to know about Yet Another Vulnerability Scoring System (YASS)? Ben Edwards breaks down Stakeholder Specific Vulnerability Categorization and how to make it work.
![A look into Web Application Security](webp/a%20look%20into%20web%20application%20security.png7f8f.webp?itok=sOg_MiHw)
An in-depth look into Web Application Security, and Bitsight's approach to related security metrics.
![7777 botnet hero](webp/7777-botnet-hero.png782e.webp?itok=6x22nxQ6)
Our latest research, a collaboration between Bitsight TRACE & the security researcher Gi7w0rm, has uncovered additional details & information about the 7777 Botnet.
![Bitsight GIA: AI-Powered Asset Mapping and Attribution](webp/blog-gia-deep-dive-image1.png0722.webp?itok=ktE2NIgR)
This blog follows up with an update on our data engine and the momentum we’re seeing with the second core component: Bitsight Graph of Internet Assets (GIA)