Quantcast
Channel: BitSight Security Ratings Blog
Browsing all 50 articles
Browse latest View live

Unveiling Socks5Systemz: The Rise of a New Proxy Service via PrivateLoader...

Recently, our Threat Research team discovered a new malware sample, distributed by the PrivateLoader and Amadey loaders. Learn more.

View Article



What is Adaptive Security (Definition and Implementation)

What is adaptive security? Explore the benefits of this approach to cyber risk reduction and how your organization can get started.

View Article

Bitsight is a proud participant in the Microsoft Security Copilot Partner...

Bitsight today announced its participation in the Microsoft Security Copilot Partner Private Preview. Bitsight was selected based on their proven experience with Microsoft Security technologies,...

View Article

How Security Ratings Supercharge Compliance

Amid a rise in regulatory pressure for cybersecurity leaders in Europe, with DORA and NIS2 as the most recent examples, cyber risk analytics emerge as an instrumental tool in ensuring compliance....

View Article

Cybersecurity Readiness (Definition and 4 Evaluation Steps)

Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats.

View Article


Cyber Regulations in the EU: 5 Proven Strategies for Compliance

With compliance deadlines approaching, where should CISOs start? Bitsight experts share five strategies to navigate the complexities of cyber regulations.

View Article

Introducing Bitsight Portfolio Risk Analytics

See risk, drive action across your entire vendor portfolio.

View Article

Bitsight and Google collaborate to reveal global cybersecurity performance

Bitsight and Google have collaborated to study global organizational performance across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework.

View Article


CISO Roles and Responsibilities (and Job Description Template)

A chief information security officer (CISO)'s roles and responsibilities include many hats in the realm of cybersecurity — but they are primarily responsible for translating complex business problems...

View Article


SLP Denial of Service Amplification - Attacks are ongoing and rising

We build on our previous work and look into how threat actors are abusing SLP to launch reflection/amplification DDoS attacks, their evolution, and what targets are they focused on at the moment.

View Article

Domain (in)security: the state of DMARC

This blog discusses the state of DMARC, the role that DMARC plays in email authentication, and why it should be a key component of your email security solution.

View Article

3 Steps Government Policymakers Can Take to Reduce Critical Infrastructure...

Here's what policymakers can do to reduce cyber risks associated with exposed industrial control systems.

View Article

Analyzing the Biggest Cybersecurity Exposure and Threat Events from 2023

As we look ahead to 2024, this is a great time to survey the damage of late to understand how enterprise risk postures need to adapt.

View Article


5 Compliance and Governance Happenings That Will Drive Exposure Management in...

Cybersecurity governance in 2023 stood out as one of the most eventful in a very long time. Here are five developments that will push CISOs and risk leaders to up their game in 2024.

View Article

Bitsight Delivers Enhanced Analytics on IT Infrastructure Service Providers

We are rolling out a new enhanced capability with innovative techniques to improve attribution of customer and corporate infrastructure associated with IT infrastructure businesses.

View Article


Vendor Discovery: Automating identification of third party relationships

Vendor Discovery, the latest capability in Bitsight’s Third-Party Risk Management solution, instantly identifies third-party relationships.

View Article

Data Insights on AgentTesla and OriginLogger Victims

AgentTesla (also known as OriginLogger) remains a prevalent commodity stealer, being daily distributed, mainly via email attachments

View Article


ShadowIT, Hidden Risk, and the insights that drive action to reduce exposure

BitSight's Auto Vendor Discovery empowers teams to effortlessly uncover and navigate the complexities of third-party relationships, providing invaluable insights that drive actions, mitigate risks, and...

View Article

Shadow IT: Managing Hidden Risk Across Your Expanding Attack Surface

Shadow IT risks are growing—but that’s just the tip of the iceberg when it comes to hidden risks across today’s expanding attack surface.

View Article

Cyber Exposure Management Meets the New SEC Reporting Requirements

Explore the impact of the SEC's new breach disclosure rules on CISOs and the crucial role of cyber exposure management in streamlining compliance and enhancing enterprise risk management.

View Article
Browsing all 50 articles
Browse latest View live




Latest Images