Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Vendor Discovery: Automating identification of third party relationships

As organizations increasingly rely on external vendors and enterprise buying patterns continue to decentralize, the challenge of managing risk associated with third parties becomes critical. Unfortunately, even uncovering vendor relationships within an organization can be a struggle, with over 80% of workers admitting to using non-approved SaaS applications. This ‘Shadow IT’ is not only frustrating; it introduces tremendous risk.

Data Insights on AgentTesla and OriginLogger Victims

AgentTesla is a Windows malware written in.NET, designed to steal sensitive information from the victim's system. It’s considered commodity malware given its accessibility and relatively low cost. Commodity malware poses a significant threat as it enables less sophisticated cybercriminals to conduct various types of cyberattacks without requiring extensive technical knowledge. AgentTesla has been a persistent and widespread threat since its emergence in 2014.

Exposure Risks with File Transfer Protocol (FTP)

Communication protocols govern data transmission between computer networks. These protocols, such as File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP), determine how data is transferred between devices through a port, which is a unique connection endpoint for a specific service. Because file transfer moves files over the internet, insecure file transfer ports create opportunities for hackers to send their own malicious payload or for other threat actors to intercept traffic.

Bitsight Delivers Enhanced Analytics on IT Infrastructure Service Providers

As third party outsourcing and cloud services become commonplace for enterprise organizations, security leaders need to understand and assess the cybersecurity risks of businesses that they partner with for “technology infrastructure services.” Security leaders want accurate, up-to-date information about their infrastructure provider’s security policies, procedures, and program performance so they can better understand risks to their own organizations.

5 Compliance and Governance Happenings That Will Drive Exposure Management in 2024

When it comes to cybersecurity governance, 2023 stood out as one of the most eventful in a very long time. With everything from the enactment of stronger new cybersecurity regulations around incident disclosure from the Securities and Exchange Commission (SEC) to significant changes afoot for financial and cloud services providers operating within the European Union, many companies worldwide will be called to adjust to a new normal in 2024.

The Apache Log4J Vulnerability: Questionnaire & VRM Tips

Apache Log4j 2, a Java-based logging library, was affected by a zero-day vulnerability on December 9, 2021. The vulnerability, known as Log4Shell and identified by the National Institute of Standards and Technology (NIST) as CVE-2021-44228, allows cybercriminals to take control of vulnerable systems and servers. Many web applications, open-source cloud platforms, and service providers utilize Log4j.

5 Considerations for an Effective Healthcare Risk Management System

The healthcare industry is no exception to the rapid levels of transformation we’re seeing across multiple industries right now. As more facilities begin to leverage electronic health records (EHRs) and internet-connected medical devices for patient care, organizations are becoming more reliant on advanced technologies. While these changes have helped advance patient care in many ways, they have also introduced the healthcare sector to greater levels of risk.

Analyzing the Biggest Cybersecurity Exposure and Threat Events from 2023

The last 12 months have been awash with incidents that led to significant data breaches, government regulatory and legal sanctions, and loss of business services availability. In 2023 we saw the most private personally identifiable information exposed, business services shut down, and CISOs fired—and even charged for legal violations by the federal government.

Quantify Cyber Materiality When Navigating APRA's Regulations

In response to the growing number of malicious actors that have managed to exploit cybersecurity vulnerabilities and cause irreparable damage to organizations, governments worldwide have decided to intervene, recognizing a need for a systematic approach to safeguarding national assets. Helping to lead the way in this institutionalized effort is the Australian Prudential Regulation Authority (APRA). ‍

Cloud Monitoring: Critical for Business Success

Cloud Monitoring is a crucial part of the security stack for many modern enterprises. More businesses have continued to shift their services and operational activity into the cloud in the form of Software (SaaS), Platform (PaaS), and Infrastructure as a Service (IaaS). They have done this for several reasons, including: This is taking place in both small- and large-scale enterprises. Threat actors have responded by targeting cloud services with increased frequency.