Unveiling Socks5Systemz: The Rise of a New Proxy Service via PrivateLoader...
Recently, our Threat Research team discovered a new malware sample, distributed by the PrivateLoader and Amadey loaders. Learn more.
View ArticleWhat is Adaptive Security (Definition and Implementation)
What is adaptive security? Explore the benefits of this approach to cyber risk reduction and how your organization can get started.
View ArticleBitsight is a proud participant in the Microsoft Security Copilot Partner...
Bitsight today announced its participation in the Microsoft Security Copilot Partner Private Preview. Bitsight was selected based on their proven experience with Microsoft Security technologies,...
View ArticleHow Security Ratings Supercharge Compliance
Amid a rise in regulatory pressure for cybersecurity leaders in Europe, with DORA and NIS2 as the most recent examples, cyber risk analytics emerge as an instrumental tool in ensuring compliance....
View ArticleCybersecurity Readiness (Definition and 4 Evaluation Steps)
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats.
View ArticleCyber Regulations in the EU: 5 Proven Strategies for Compliance
With compliance deadlines approaching, where should CISOs start? Bitsight experts share five strategies to navigate the complexities of cyber regulations.
View ArticleIntroducing Bitsight Portfolio Risk Analytics
See risk, drive action across your entire vendor portfolio.
View ArticleBitsight and Google collaborate to reveal global cybersecurity performance
Bitsight and Google have collaborated to study global organizational performance across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework.
View ArticleCISO Roles and Responsibilities (and Job Description Template)
A chief information security officer (CISO)'s roles and responsibilities include many hats in the realm of cybersecurity — but they are primarily responsible for translating complex business problems...
View ArticleSLP Denial of Service Amplification - Attacks are ongoing and rising
We build on our previous work and look into how threat actors are abusing SLP to launch reflection/amplification DDoS attacks, their evolution, and what targets are they focused on at the moment.
View ArticleDomain (in)security: the state of DMARC
This blog discusses the state of DMARC, the role that DMARC plays in email authentication, and why it should be a key component of your email security solution.
View Article3 Steps Government Policymakers Can Take to Reduce Critical Infrastructure...
Here's what policymakers can do to reduce cyber risks associated with exposed industrial control systems.
View ArticleAnalyzing the Biggest Cybersecurity Exposure and Threat Events from 2023
As we look ahead to 2024, this is a great time to survey the damage of late to understand how enterprise risk postures need to adapt.
View Article5 Compliance and Governance Happenings That Will Drive Exposure Management in...
Cybersecurity governance in 2023 stood out as one of the most eventful in a very long time. Here are five developments that will push CISOs and risk leaders to up their game in 2024.
View ArticleBitsight Delivers Enhanced Analytics on IT Infrastructure Service Providers
We are rolling out a new enhanced capability with innovative techniques to improve attribution of customer and corporate infrastructure associated with IT infrastructure businesses.
View ArticleVendor Discovery: Automating identification of third party relationships
Vendor Discovery, the latest capability in Bitsight’s Third-Party Risk Management solution, instantly identifies third-party relationships.
View ArticleData Insights on AgentTesla and OriginLogger Victims
AgentTesla (also known as OriginLogger) remains a prevalent commodity stealer, being daily distributed, mainly via email attachments
View ArticleShadowIT, Hidden Risk, and the insights that drive action to reduce exposure
BitSight's Auto Vendor Discovery empowers teams to effortlessly uncover and navigate the complexities of third-party relationships, providing invaluable insights that drive actions, mitigate risks, and...
View ArticleShadow IT: Managing Hidden Risk Across Your Expanding Attack Surface
Shadow IT risks are growing—but that’s just the tip of the iceberg when it comes to hidden risks across today’s expanding attack surface.
View ArticleCyber Exposure Management Meets the New SEC Reporting Requirements
Explore the impact of the SEC's new breach disclosure rules on CISOs and the crucial role of cyber exposure management in streamlining compliance and enhancing enterprise risk management.
View Article
More Pages to Explore .....