Find out which cyber threats you should be concerned about

This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 … Continue reading Find out which cyber threats you should be concerned about

Critical vulnerabilities take 4.5 months on average to remediate

Over a third of organizations had at least one known vulnerability in 2023, with nearly a quarter of those facing five or more, and 60% of vulnerabilities remained unaddressed past CISA’s deadlines, according to Bitsight. Organizations struggle t… Continue reading Critical vulnerabilities take 4.5 months on average to remediate

Advanced cybersecurity strategies boost shareholder returns

Companies demonstrating advanced cybersecurity performance generate a shareholder return that is 372% higher than their peers with basic cybersecurity performance, according to a new report from Diligent and Bitsight. Boards under pressure to fortify c… Continue reading Advanced cybersecurity strategies boost shareholder returns

Which cybersecurity controls are organizations struggling with?

How are organizations performing across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework? A recent analysis by Bitsight and Google reveals some good and some bad results – and room for improvement. What is MVSP? Minimu… Continue reading Which cybersecurity controls are organizations struggling with?

Infosecurity Europe 2023 video walkthrough

Infosecurity Europe 2023 is taking place in London this week, and this video provides a closer look at this year’s event.
The post Infosecurity Europe 2023 video walkthrough appeared first on Help Net Security.
Continue reading Infosecurity Europe 2023 video walkthrough

Who’s Behind the Botnet-Based Service BHProxies?

A security firm has discovered that a five-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies, which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service. Continue reading Who’s Behind the Botnet-Based Service BHProxies?

Schneider Electric collaborates with BitSight to enhance OT exposure detection

Schneider Electric partners with BitSight to develop a global Operational Technology (OT) Risk Identification and Threat Intelligence capability. In recent years, both opportunistic and advanced cyber threat actors have shown increased willingness to t… Continue reading Schneider Electric collaborates with BitSight to enhance OT exposure detection

BitSight Third-Party Vulnerability Detection increases visibility into vendor risk

BitSight has enhanced its Third-Party Risk Management (TPRM) platform to provide additional insights to customers, helping them to more proactively detect and mitigate vulnerabilities and exposure across their third-party vendor ecosystem. BitSight als… Continue reading BitSight Third-Party Vulnerability Detection increases visibility into vendor risk