Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Risk Management: Defining, Measuring, & Mitigating the Risks of AI

‍ Artificial intelligence (AI) used to be something that only existed in science fiction novels and dystopian movies. Then, technology advanced, and it became a reality, being slowly implemented into experimental projects and niche use cases. Now, however, it is shaping real business outcomes, accelerating decisions and automating processes in ways that are becoming commonplace in daily market operations. ‍

Collision Course: The Inevitable Convergence of Third Party Risk and Exposure Management

In February 2024, a ransomware attack on a critical player in the US healthcare infrastructure sent shockwaves through the US and globally. Pharmacies were unable to process prescriptions using patients' insurance, leading to delays in medication dispensing and highlighting the fragility of the healthcare supply chain. Hospitals and medical offices faced severe operational disruptions, struggling to provide patient care, submit insurance claims, and receive payments.

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. Think rogue cloud storage, messaging platforms, or unapproved SaaS tools. These all often slip past governance until they trigger a breach, compliance issue, or operational failure. Now, a more complex threat is emerging - Shadow AI.

The Evolution of AI: From Symbolic Reasoning to GPTs and Agentic Systems

It seems like Artificial Intelligence (AI) has suddenly appeared in everything, everywhere, all at once. What feels like “five minutes ago”, there was “pre-AI life”, and now we have AI assistants that speak like real people, apps that create images, music, and video from nothing, and AI agents that do work for us.

Meeting Security Standards Through Effective Penetration Testing Practices

These days, cyberattacks aren't just more common; they're smarter and far more costly. That's why companies can't afford to gamble with their security. Enter penetration testing (or pentesting). Done right, it's a crucial tool that helps organizations find weak spots before attackers do and proves they're meeting key security standards.

Nucleus Momentum Validated Across Three Industry Analyst Reports

It’s one thing for us to say Nucleus is changing how enterprises address vulnerability and exposure management. It’s another when three different analyst firms all say it, and at the same time. In recent weeks, Forrester, IDC, and GigaOm each published their latest market evaluations, recognizing Nucleus in all three. That’s rare validation in a market where many vendors don’t even make the cut for inclusion.

Hack to School: Top 10 Cyber Threats Facing the Education Sector in 2025

As students return to classrooms, a different kind of "back-to-school" activity is ramping up: Hack-to-School. Cybercriminals and nation-state actors are intensifying their focus on educational institutions. According to Bitsight Threat Intelligence, the education sector is now the third-most targeted industry by cyber threat actors, facing a wide range of persistent and emerging risks.

Introducing proactive, AI-powered risk management that breaks the cycle of reactive risk

Risk doesn’t live in just one place—it comes from vendors, suppliers, partners, and from inside your business through processes, people, and systems. ‍ Managing that risk is often fragmented, too. Vendor reviews live in one system, internal issues in another, and leadership reports take hours to compile. And every new vendor, tool, or requirement contributes to another layer of risk.

Bitsight GIA Update: How Gen-AI and LLMs Get You Faster (and Better) Entity Mapping

Bitsight’s mission to keep evolving the capability of our data engine through AI enhancements hit a new milestone today. The latest addition is a new entity mapping capability added to Bitsight AI and the data engine, which uses GenAI agents to create more complete and consistent sets of identifiers for organizations scanned and added to Bitsight’s entity inventory.

What is an Enterprise Risk Retainer?

Organizations today are under pressure to effectively respond to acute risk events that can threaten financial stability, regulatory compliance, executive safety and stakeholder trust. Hear from Managing Director Nickolas Savage on the importance of getting the right support quickly, while maintaining cost efficiency and operational resilience.