Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Implementing a cybersecurity incident response plan can help you effectively address a cyber event, reduce disruptions to business, and ensure compliance.

Third party risk management is trending following major data breaches affecting organizations through their vendors. But what is TPRM?

At Bitsight, our collective observations highlight five critical areas that will shape cybersecurity strategies in 2025.

If you operate in specific sectors, cybersecurity maturity is more than a best practice, it’s a regulatory requirement. These regulations are complex and constantly changing. To help you better understand your organization's regulatory environment and the standards and controls they stipulate, let's break down key cyber compliance regulations by industry.

Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.

Malware can gain entry to your network in many ways. Once malware has penetrated a network, threat actors can use it to steal information, encrypt systems, spy on users, and remove files. Learn how to prevent dangerous malware.

In 2021, ransomware attacks on government agencies globally increased by 1,885% over 2020 attacks, and the trends are continuing so far in 2022. Learn how to protect your organization from ransomware with three best practices.

Learn about the top ransomware attack vectors favored by hackers and the steps you can take to protect your organization.

Continuing our web app security series: explore POST requests and how logging out works with cookies and session IDs and more.

This is a continuation of the series on web application security where we dive into cookie dynamics.

This blog starts with the basics as part of a series regarding operational security, such as web application headers and defenses against attacks such as cross-site scripting (XSS), cross-site request forgery (CSRF), and vulnerabilities in included libraries.

How Bitsight leadership has set up and run a workable AI Council balancing innovation through the use of AI with being a cybersecurity risk management firm.

Our response to CVEs within the CUPS printing system, where several critical vulnerabilities were identified.

A chief information security officer (CISO)'s roles and responsibilities include many hats in the realm of cybersecurity — but they are primarily responsible for translating complex business problems into effective information security controls.

Is there a difference between cybersecurity vs. information security? Learn more about the distinctions between the two areas, where they overlap, and how both have evolved.