Michael KatzinBitsightVendor Risk Assessment for ISO 27001 RequirementsISO/IEC 27001:2013 (ISO 27001) is one of the most popular international standards for managing information security. It helps organizations…4 min read·Feb 27, 2023----
Michael KatzinBitsightThe ultimate guide to TPRM: What is Third-Party Risk Management?Vendor risk management ( VRM) and third party risk management ( TPRM) are trending terms following a series of major cyberattacks and data…4 min read·Feb 17, 2023----
Michael KatzinBitsightPredicts 2023: Cybersecurity Industry Focuses on the Human Deal by Gartner® (2023 Cyber Trends)Challenges confronting CISOs are evolving beyond technology, cybersecurity, and controls. “By 2025, lack of talent or human failure will be…5 min read·Feb 16, 2023----
Michael KatzinBitsightCISOs’ Tactics to Win Every Budget BattleCISOs today don’t just protect the company from cyber attackers. They provide assurance to customers, investors, regulators, and other…4 min read·Feb 9, 2023----
Michael KatzinBitsight7 Cyber Security KPIs That Will Resonate On A Cybersecurity Dashboard For Your Board of DirectorsAs cyber risk increases, business leaders are seeking greater visibility and understanding of their organizations’ security programs. Their…5 min read·Jul 12, 2022----
Michael KatzinBitsight7 Cyber Security KPIs That Will Resonate On A Cybersecurity Dashboard For Your Board of DirectorsAs cyber risk increases, business leaders are seeking greater visibility and understanding of their organizations’ security programs. Their…5 min read·Jul 12, 2022----
Michael KatzinBitsightWhat is a Botnet and How to Detect and Prevent AttacksA botnet (or “robot network”) is a collection of networked devices infected with malware and hijacked to perpetrate large-scale scams and…3 min read·Jun 28, 2022----
Michael KatzinBitsightWhat is Malware and How to Avoid Becoming a VictimWe’ve all heard the term “malware,” but do you know what it really is?4 min read·Jun 21, 2022----
Michael KatzinBitsightAtlassian Confluence vulnerability (CVE-2022–26134) and what it means for your businessConfluence Vulnerability — Executive Summary6 min read·Jun 15, 2022----
Michael KatzinBitsightHow To Build a Trusted Cybersecurity ProgramCybersecurity leaders feel relentless pressure to improve cybersecurity posture, remediate gaps in their strategy, and minimize cyber risk…4 min read·May 26, 2022----