Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

What is a Third-Party Data Breach? 7 Recent Examples

A third-party data breach is a security incident where an organization's sensitive data is compromised or stolen due to a vulnerability or cyber attack on one of its third party vendors. This type of breach happens outside the primary organization's own IT infrastructure but still impacts them, as the third-party vendor, contractor, or service provider has access to their data.

What is Cybersecurity Risk and How Can You Manage It?

Cyber risk is the potentially negative impact to an organization when information systems fail or are damaged, disrupted or destroyed by unauthorized use or by cyberattack. In the world of risk management, risk is commonly defined as threat times vulnerability times consequence. The objective of risk management is to mitigate vulnerabilities to threats and the potential consequences, thereby reducing risk to an acceptable level.

What is Cybersecurity Compliance? List of Compliance Regulations by Industry

Cybersecurity compliance refers to the practice of adhering to laws, standards, and regulatory requirements established by governments and industry authorities. These compliance regulations are designed to protect a business’ digital information and information systems from cyber threats, including unauthorized access, use, disclosure, disruption, modification, or destruction.

Cyber Security Monitoring: 5 Key Components

Cyber security monitoring is the practice of continuously observing IT systems to detect cyber threats, data breaches, and other security issues. By helping to identify threats early, monitoring solutions can help to mitigate attacks faster and limit the damage they can do. Monitoring solutions may track activity on networks as well as endpoints like individual laptops, mobile phones, desktop computers, and IoT devices.

A 2025 Guide to SOX Compliance

The Sarbanes-Oxley Act (SOX), enacted in 2002, is a U.S. federal law established to enhance corporate governance and strengthen the accuracy and reliability of financial reporting for publicly traded companies. SOX aims to protect investors and the public by enforcing stringent reforms to improve financial disclosures and prevent corporate fraud.

Stating the Obvious: Vulns On the Rise in 2025

Happy New Year! As we usher in a year with some pleasant mathematical properties, I wanted to take a brief look back at one of the stories that was most interesting to me as a security data nerd from last year: our dependency on the National Institute of Standards and Technologies’s (NIST) National Vulnerability Database(NVD), and what the degradation in service has meant to the flow of information about new CVEs. TL:DR.

5 Cybersecurity Trends for 2025: Preparing for a Year of Elevated Risk and Accountability

As security and risk leaders look to the year ahead, they face a rapidly evolving and dynamic set of challenges. The implementation of more stringent cybersecurity standards—such as the U.S. Security and Exchange Commission’s (SEC) rules and the EU’s Network and Information Security Directive 2 (NIS2)—has placed boardroom scrutiny at an unprecedented level.

Instant Insights for SOC 2 Reporting: Using AI to Streamline Vendor Assessments

With technology supply chain risks at an all-time high, many governance, risk, and compliance (GRC) teams conduct formal risk assessments as part of their new vendor selection and onboarding processes. Audit-based reporting frameworks like SOC 2 are invaluable to these efforts, as they provide a consistent way to benchmark prospective vendors’ customer data management practices.

Shaping our 2025 Data Engine Priorities: Industry Evolution and Customer Feedback

The effectiveness of external attack surface management (EASM) and third-party risk management (TPRM) capabilities hinges on the depth, breadth, and timeliness of the underlying data they are based on. For this reason, Bitsight makes a significant ongoing investment in: The introduction of Bitsight’s next-generation data engine enabled many improvements to our capabilities across all of these areas throughout 2024.

General Data Protection Regulation (GDPR) Compliance: An Advanced Guide

The General Data Protection Regulation (GDPR) is a pivotal framework that governs data protection and privacy for individuals within the European Union (EU). Its implications are far-reaching, affecting organizations worldwide that handle EU citizens' data. Understanding and achieving GDPR compliance is essential to avoid substantial penalties and to maintain trust with customers.

Web Application Security for DevOps: Cross-Origin Resource Sharing (CORS) and Subresource Integrity (SRI)

With all of that background from parts 1, 2, and 3 of this series out of the way, let's turn to some practical considerations for real-world web applications. The inherent security restrictions for resources, including cookies and JavaScript, assume that each website contains all of its functionality in one neat, isolated package. But websites often contain content and functionality from multiple websites that trust each other.