Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is TISAX certification? A 101 guide to compliance

With the rapid adoption of AI and automation technologies, the automotive industry is experiencing a massive transformation. From autonomous driving tech to vehicles connected with cloud-based services, these innovations are reshaping how automakers and suppliers operate globally. However, these shifts have introduced new vulnerabilities, especially cyber risks, that need to be addressed.

What is Swatting? How Fake Emergency Calls Turn Deadly

Cyber pranks have increased in the past few years. There is a fine line between playing a prank and harassing someone. People in the excitement of playing a prank often land themselves and others in trouble. On the other hand, some individuals harass others due to a dispute or revenge. On most occasions, victims narrowly escape the harassment against them, but sometimes, they pay severe consequences in the form of property damage, injury, or even death.

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

In October 2025, Microsoft disclosed a critical remote code execution vulnerability (CVE-2025-59287) in Windows Server Update Services (WSUS), which enables unauthenticated attackers to gain full control over affected servers. WSUS is a central patch management tool in Windows environments, responsible for approving, distributing, and monitoring updates across corporate networks.

How to MFA Everywhere

What makes you, you? Is it your physical representation, your memories, your choices, your relationships? In the physical world, identity is deep and layered. But online, all of that is stripped away. To a computer, you are not your story. You are a login. You are a password, a cookie, or a session. You are a code sent to your phone. That is the entire test of your existence in the digital realm. Which means if someone else holds those same fragments, the system will treat them as you.

Introducing Bitsight Command Center: The Next Step in Cyber Risk Intelligence

Today’s security teams face disconnected tools and scattered data, which makes managing cyber risk increasingly complex. With the rapid rise in ransomware, new CVEs, and a constant stream of emerging threats, it has become difficult to monitor not only an organization’s own security posture but also the security of its third- and fourth-party vendors.

An Identity Security taxonomy for Agentic AI

Agentic AI is a fundamentally new paradigm. AI agents can interact with various tools and act dynamically and probabilistically as they encounter new inputs. That means they end up falling somewhere between an application and a user in terms of how they operate. Indeed, the interaction with other applications is what gives agentic AI its power; however, this also has implications for identity security and access management.