Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is a Whaling Attack and How to Prevent It

A whaling attack is a type of phishing attack that targets senior executives. The act of whaling is usually perpetrated via email and involves deceiving victims into initiating actions that put the organization and its assets at risk. In this blog, we explore how a whaling attack works, why executives are targeted, examples of successful whaling attacks, and steps you can take to prevent them.

7 Third-Party Risk Management Trends to be Aware of in 2024

Whether your organization is prepared or not, the risks associated with third-party partnerships will continue to increase. In 2022, approximately 1,802 data breaches exposed the information of more than 422 million individuals in the United States alone. While those numbers are enough to frighten any organization, many reports expect them to continue to rise throughout 2024.

Choosing Automated Vendor Risk Remediation Software (in 2023)

Vendor Risk Management is critical for reducing the impact of security risks associated with third-party vendors. But often included with this cybersecurity practice is a bloat of administrative processes that disrupt workflows and impact VRM efficacy, defeating the purpose of even having a VRM program. To establish a scalable Vendor Risk Management program, cybersecurity teams should take advantage of every opportunity to replace manual processes with automation technology.

What is Cyber Insurance? (And Is It Worth the Costs?)

Cyber attacks have grown significantly over the last few years, and their cost to victim organizations marches ceaselessly upward as well. Now many of those victim organizations are learning the hard way that business insurance policies often won’t cover the regulatory fines from security incidents that are considered “preventable.” Hence the need for extra protections from “cyber insurance” to fill any coverage gaps you might have.

Spot risks with our new IP view

Customers often tell us of instances where someone in their team spins up a new machine that isn’t using an approved geolocation, or that they see an unexpected spike in hosting from a particular country. These anomalies can put an organization at risk, especially since they are difficult to spot in an automated way.

NIST Cyber Risk Scoring

As companies continue to face new and increasing cybersecurity risks, the National Institute of Standards and Technology (NIST) has developed a cyber risk scoring methodology that helps organizations to assess, quantify, and manage their cybersecurity posture effectively. The NIST Cyber Risk Scoring solution improves NIST’s security and privacy assessment processes by providing real-time contextual risk data, enhancing awareness, and prioritizing necessary security actions.

An Easy Guide to Understanding Risk Management and Quantification, Part 1

When it comes to securing your enterprise and keeping it safe, your success depends on effective communication. How can you explain cyber risks to the board in a way that's easy to understand, yet still packs a punch? Cyber Risk Quantification (CRQ) is a methodological approach that allows security teams to measure and quantify cyber risks in financial terms.

What Data Breaches Tell Us: An Analysis of 17,000 U.S. Data Breaches

Data breach attacks are serious problems for companies, organizations and institutions all over the world. For example, in the US one data breach costs on average 9.4 Million USD, which is the highest worldwide. To handle—or ideally, prevent—these attacks, we need to understand first the “why” and “how” of an attack. With this objective in mind, Bitsight analyzed more than 17,000 data breach events from the last seven years affecting 23 sectors in the US.

Safeguard Your Business From the Risks of Social Media

In recent years, social media platforms have become invaluable tools for businesses to engage with their customers, reach a wider audience and enhance their brand visibility. From TikTok’s viral challenges to Instagram’s visually appealing content — and the ever-present Twitter and Facebook — these platforms offer unparalleled opportunities for organizations to connect with their target market. However, with great opportunities come great risks.

CIS Critical Security Controls: What Are They and How Can You Meet These Standards?

s cyber threats evolve and business models change, maintaining a mature cybersecurity program can be challenging. You need to be confident that your organization’s current security tools and techniques are effective. A single error or postponement in resolving a software problem can create weaknesses in your IT infrastructure, increasing the likelihood of cyber attacks.