Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sensitive Data: Examples & How to Protect It

As a security professional navigating the new challenges constantly cropping up in cybersecurity, it’s critical to understand the ways your organization’s data could be exposed. Safeguarding sensitive information is paramount for organizations across all industries. Whether it's personal data of customers and employees or proprietary business information, the consequences of data breaches can be severe, ranging from financial losses to reputational damage.

Milestone Progress: Accelerated Rating Rescans

Bitsight customers and their third-party partners are well on their way to gaining faster clarity on how their remediation efforts impact their Bitsight Security Ratings. In an effort to support organizations that use Bitsight to prioritize internal security work, we started a phased rollout of Dynamic Remediation, a new initiative that accelerates the rating refresh process and makes it more responsive to meaningful security remediations.

How Research Supports the 2025 Bitsight Rating Algorithm Update

In keeping with Bitsight's ongoing commitment to making its ratings more meaningful and more representative of an ever-changing Cybersecurity landscape, the Ratings Algorithm Update for 2025 is scheduled to go into preview on April 8, 2025. The highlight of RAU 2025 is the incorporation of the Web Application Security(WAS) risk vector into the Bitsight Security Ratings1, and the associated deprecation/removal of Web Application Headers(WAH) risk vector.

Identifying Compromised Credentials with Identity Intelligence

Every day, stolen credentials are bought, sold, and exploited on the dark web, fueling account takeovers, data breaches, and financial fraud. Organizations must act fast to stop these threats before they escalate. Yet, traditional security tools struggle to detect compromised credentials before it’s too late. According to Bitsight’s upcoming State of the Underground 2025 report, leaked credentials surged by 24% and logs listed on underground markets rose by 13.2% in 2024 alone.

The European Supply Chain Battlefield: Cybersecurity, National Defense, and the NIS2 Directive

In an increasingly interconnected digital world, supply chain security has become a critical concern for European organizations, policymakers, and national defense agencies alike. With adversaries exploiting software dependencies, contractors, and managed service providers (MSPs), the cybersecurity risks embedded within supply chains have never been more significant.

Bringing Data Privacy and Cyber Insurance Together with Bitsight

The cyber insurance industry continues to face challenges related to traditional cyber security risks, and more recently, data privacy risks. In many cases, traditional cyber insurance policies may cover legal fees or costs related to a data privacy infringement. Organizations not only get hit with class action lawsuits following incidents like breach of PII/PHI, but are seeing demand letters from law firms who are looking to protect their clients from any possible disclosure of their sensitive data.

What to Expect from Bitsight's 2025 Ratings Algorithm Update

In anticipation of Bitsight’s upcoming 2025 Ratings Algorithm Update (RAU), many organizations are eager to learn more about what to expect from the changes. We are excited to share that the update will be ready for preview on April 8th in the Bitsight applications so that everyone can proactively prepare for the RAU.

Uncovering Cyber Risks in the Global Supply Chain

No organization can achieve its goals on its own. To truly get ahead in the rapidly transitioning digital society, any organization will need a diverse group of partners who specialize in the products and services they do not. Commonly referred to as a “supply chain” this web of connections ensures the world operates smoothly, but navigating its many connections is challenging. Luckily, Bitsight TRACE doesn’t shy away from a challenge.

Massive DDoS on X: Dark Storm or Cyber Fog?

Earlier this week, users of the X (formerly Twitter) social network were either unable to access the platform or experienced service degradation somehow. On March 10, 2025, reports emerged of users worldwide being unable to log in, post, or view content. This incident was later attributed to a large-scale distributed denial-of-service (DDoS) attack targeting X's infrastructure.

The Top 7 Cybersecurity Frameworks

In today’s ever evolving threat landscape, protecting an organization's digital assets is no longer optional—it's a critical business imperative. Security ratings can provide a snapshot of your organization's cyber health, but to demonstrate a robust, long-term commitment to cybersecurity, it’s essential to align with recognized industry and regulatory best practices. This is where cybersecurity frameworks come into play.