Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Positive Risk vs. Negative Risk in Enterprise Risk Management

Businesses face risk all the time – and that’s OK. Even though the word “risk” typically has negative connotations, the term can actually represent many situations, not all of them unfavorable. ISO 31000 states that risk is the “effect of uncertainty on objectives.” That actually means risk can come in two types: positive and negative.

How to Negotiate the Best Cyber Insurance Policy

Most companies will quickly accept the insurance provider's first offer when negotiating cybersecurity insurance policies. Although a relatively new component of the insurance sector, providers have still been conducting cyber assessments and offers for years and are the so-called expert. ‍ However, this way of thinking costs enterprises thousands, if not millions, of dollars a year in deductibles.

Cybersecurity in the Entertainment Industry: Risks and Solutions

Book publishers, movie distributors, TV producers, game developers, and newspaper publishers are just a few of the many businesses in the media and entertainment industry increasing their use of online services. Streaming services and the production of digital assets are the norm for media companies around the globe.

What is a Whaling Attack and How to Prevent It

A whaling attack is a type of phishing attack that targets senior executives. The act of whaling is usually perpetrated via email and involves deceiving victims into initiating actions that put the organization and its assets at risk. In this blog, we explore how a whaling attack works, why executives are targeted, examples of successful whaling attacks, and steps you can take to prevent them.

7 Third-Party Risk Management Trends to be Aware of in 2024

Whether your organization is prepared or not, the risks associated with third-party partnerships will continue to increase. In 2022, approximately 1,802 data breaches exposed the information of more than 422 million individuals in the United States alone. While those numbers are enough to frighten any organization, many reports expect them to continue to rise throughout 2024.

Choosing Automated Vendor Risk Remediation Software (in 2023)

Vendor Risk Management is critical for reducing the impact of security risks associated with third-party vendors. But often included with this cybersecurity practice is a bloat of administrative processes that disrupt workflows and impact VRM efficacy, defeating the purpose of even having a VRM program. To establish a scalable Vendor Risk Management program, cybersecurity teams should take advantage of every opportunity to replace manual processes with automation technology.

What is Cyber Insurance? (And Is It Worth the Costs?)

Cyber attacks have grown significantly over the last few years, and their cost to victim organizations marches ceaselessly upward as well. Now many of those victim organizations are learning the hard way that business insurance policies often won’t cover the regulatory fines from security incidents that are considered “preventable.” Hence the need for extra protections from “cyber insurance” to fill any coverage gaps you might have.

Spot risks with our new IP view

Customers often tell us of instances where someone in their team spins up a new machine that isn’t using an approved geolocation, or that they see an unexpected spike in hosting from a particular country. These anomalies can put an organization at risk, especially since they are difficult to spot in an automated way.

NIST Cyber Risk Scoring

As companies continue to face new and increasing cybersecurity risks, the National Institute of Standards and Technology (NIST) has developed a cyber risk scoring methodology that helps organizations to assess, quantify, and manage their cybersecurity posture effectively. The NIST Cyber Risk Scoring solution improves NIST’s security and privacy assessment processes by providing real-time contextual risk data, enhancing awareness, and prioritizing necessary security actions.

What Data Breaches Tell Us: An Analysis of 17,000 U.S. Data Breaches

Data breach attacks are serious problems for companies, organizations and institutions all over the world. For example, in the US one data breach costs on average 9.4 Million USD, which is the highest worldwide. To handle—or ideally, prevent—these attacks, we need to understand first the “why” and “how” of an attack. With this objective in mind, Bitsight analyzed more than 17,000 data breach events from the last seven years affecting 23 sectors in the US.