Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Compliance to Cyber Resilience: Leadership Lessons from the Frontline

In this fireside chat, Randy Vickers, Deputy CISO at the National Student Clearinghouse, shares hard-earned lessons on securing sensitive data at scale, navigating vendor risk, and leading high-impact security programs—especially when budgets are tight and threats are evolving fast.

Staying Ahead of Evolving Cyber Threats: What Security Teams Need to Know

Dan Bradbury, Chief Product Officer at UpGuard, kicks off our 20th Summit with a look at how far we’ve come—and where we’re headed. From AI-powered risk assessments to expanded threat intelligence, discover what’s new, what’s next, and how your feedback continues to shape our roadmap.

47% of Breaches Involve Vendors: Is Your TPRM Ready?

Organizations are still struggling to manage vendor-related cyber risk effectively. According to a recent study by Imprivata and the Ponemon Institute, nearly half of organizations fall victim to data breaches involving third-party network access. This isn't just another statistic. It's a critical cybersecurity issue hinting at broader limitations of traditional TPRM programs.

The Guide for Moving From Qualitative to Quantitative Risk Assessments

‍Once relegated to the technical corners of the organization, cybersecurity is no longer an isolated business problem that can be attended to reactively. Amid the rising costs of cyber incidents and growing regulatory scrutiny, it has become a high-level business risk that requires proactive analysis.

May 2025 Release: Charting the Future of Risk Reduction with Nucleus

Vulnerability management is no longer about simply cataloging risks. It’s about reducing them intelligently, at scale, and in alignment with how your business operates. At Nucleus, we believe in building a platform that doesn’t just surface issues, but solves them. With our latest release, we’re doubling down on that vision.

Power Your Delivery Efficiency with Advanced System Solutions

Logistics is in perpetual motion, many times at a breakneck speed. From rising fuel prices and an enduring driver shortage to the insatiable customer demand for same-day, lightning-fast delivery, fleet, operations, and logistics managers are in a daily struggle to keep their wheels turning smoothly. The push toward more visibility and control of operations isn't a fad; it's a call to survival. But suppose you weren't just able to meet these challenges but actually overcome them, turning your delivery operations into a streamlined, high-performance powerhouse? That's where advanced system solutions enter the picture.

Lumma Stealer is Out... of business!

Since mid-2024, Bitsight has been collaborating with Microsoft’s Digital Crimes Unit and other partners to dismantle the operational capabilities of Lumma Stealer (LummaC2) — currently the most widely distributed information stealer. Early this week, a coordinated action was carried out to disrupt its operations and take down the supporting malware infrastructure.

Detecting Generative AI Data Leaks from ComfyUI

By now we’re all familiar with the capabilities of generative AI for creating images. For some tasks, like casting an existing image in a recognizable art style, it works well. Much more than that and it encounters limitations: complex prompts often don’t return exactly what you imagined and iterating on a failed prompt can quickly become time-consuming.

Digital Brand Protection in the Age of Impersonation

Online fraud remains a significant and rapidly expanding threat in today's cyber threat landscape. According to the FTC, consumers in the U.S. lost a staggering $12.5 billion to fraud in 2024, a 25% surge from the previous year. The most commonly reported category? Imposter scams. This difficult-to-intercept form of fraud alone accounted for $2.95 billion of those losses.

External Exposure: Navigating Risk for the Multi-National Enterprise

The bigger your business, often the larger the size of the attack surface you need to secure. That’s why multi-national enterprises typically face a different set of cyber security priorities than SMBs. Here’s another, less often discussed factor that can complicate security and risk management: Whether your company is a multiple entity or a single entity.