Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bitsight AI Empowers Microsoft's New Threat Intelligence Briefing Agent

Threat Intelligence (TI) has become the secret weapon of modern security teams—essential for identifying possible emerging threats before they escalate. But TI is only as valuable as its accuracy, relevancy, and timeliness. Unfortunately, many traditional TI approaches can no longer keep up, as security teams are plagued with information overload: too many signals, too little context, and limited resources to process everything. This is why the coupling of GenAI and TI is a game changer.

AI is already embedded in our everyday tools, often without us realizing it. | UpGuard #ai

“AI is already embedded in our everyday tools, often without us realizing it. That changes how security teams need to adapt.” Hear from Randy Vickers, Deputy CISO at the National Student Clearinghouse, in this fireside chat from UpGuard Summit 20, as he shares how his team is staying ahead of AI’s evolving role in cybersecurity.

Open Chroma Databases: A New Attack Surface for AI Apps

Chroma is an open-source vector store–a database designed to allow LLM chatbots to search for relevant information when answering a user’s question–and one of many technologies that have seen adoption grow with the recent AI boom. Like many databases, Chroma can be configured by end users to lack authentication and authorization mechanisms.

Elevating Cyber GRC With a Smarter Risk Register Strategy

‍Cybersecurity governance, risk, and compliance (GRC) programs are gaining institutional support, with 61% of respondents from Sprinto's "Pulse of Cyber GRC Report 2025" claiming that embedding GRC into their business strategy is one of their organization's top priorities. Even so, only 53% state that they are doing so effectively, highlighting the prevalent gap that exists in the cybersecurity world between intention and execution.

Modeling Cyber Resilience Is Now a Regulatory Priority

‍ ‍The European Central Bank (ECB), tasked with maintaining financial stability in the region, is changing how it supervises institutional resilience. According to a July 2025 Reuters report, banks across the Eurozone are being asked explicitly to model how large-scale disruptions, including geopolitical conflict, potential dollar shortages, and cyber incidents, could impact their capital reserves.

Bitsight Identifies Thousands of Security Cameras Openly Accessible on the Internet

Welcome to 2025, where thousands of internet-connected cameras meant to protect us are actually putting us at risk. In our latest research at Bitsight TRACE, we found over 40,000 exposed cameras streaming live on the internet. No passwords. No protections. Just out there. We first raised the alarm in 2023, and based on this latest study, the situation hasn’t gotten any better.

Third Party Security: Building Your Vendor Risk Program in 2025

Are you confident your vendors can withstand a cyber attack? If not, you should continuously evaluate your third-party security, especially if you’re sharing sensitive customer data across your vendor ecosystem. In this post, we break down the concepts of third-party security and provide an actionable roadmap for effectively strengthening this essential branch of cybersecurity across your organization.

Vendor Security Review: Key Components And Implementation

Your vendors are essential partners, but they could also be your organization's biggest hidden security risk. A robust vendor review process is the key to ensuring onboarded vendors align with your cybersecurity standards and don't increase your likelihood of suffering a data breach. This guide outlines everything you need to know to build a structured, repeatable, and scalable vendor security review process.

Shadow AI leak exposes data from 571 Canva Creators #ai #cybersecurity #dataleak #vendor #vendorrisk

571 Canva Creators had their personal data exposed by an unsecured Chroma database. The database, used by Russian AI startup My Jedai, contained 341 document collections. One of these collections included survey responses with emails, countries of residence, and detailed feedback on the Canva Creators program. This isn’t your typical breach. It’s the result of unsecured AI infrastructure.