Industrial control systems (ICS) play a vital role in critical infrastructure, yet new research from Bitsight's TRACE team has exposed multiple critical vulnerabilities in Automated Tank Gauge (ATG) systems. Join experts Jake Olcott, VP of Government Affairs, and Pedro Umbelino, Principal Research Scientist, as they...
In the security world, no news is good news. But success on the job for the Chief Information Security Officer (CISO) can be a double-edged sword. When everything is going right, it can be easy to forget all that goes into keeping threats at bay. And that’s precisely when vigilance within the organization can...
In today’s digital world, new threats constantly challenge cybersecurity frameworks, often pushing third-party risk management teams into reactive, high-stress responses. This webinar explores ways to move from reactive to proactive incident response, enhancing organizational resilience. Attendees will learn...
The cybersecurity landscape is evolving rapidly, yet despite billions spent on defense measures, breaches continue to rise. Organizations are investing in MDR/EDR/XDR solutions, but the question remains—are these investments truly reducing risk? As cyberattacks threaten market reputation, shareholder value, and...
In March 2024, a database containing the personal information of 442,519 Life360 customers was leaked, one of many recent data breaches attacking API vulnerabilities.
API’s are frequently embedded in backend framework for mobile and web applications, therefore a common area for hackers to target. How can an...
Staying ahead of cyber threats requires more than just reactive measures—it demands a proactive approach informed by reliable data and robust analysis.
As economic pressures mount, CISOs face increasing demands to optimize their cybersecurity budgets while maintaining robust defenses. This webinar delves into strategies for maximizing security investments and the benefits of technology consolidation. Learn how to navigate budget scrutiny and leverage a unified...
Web applications and APIs of today have empowered companies to create lightning-fast online experiences, revolutionizing user engagement and satisfaction. Developers benefit from automation and scripting to enhance productivity, search engine optimization, and resource management efficiently.
However, these same...
Bradon Rogers, chief customer officer at Island, details how traditional browser frameworks amplify security risks. His approach challenges the status quo, suggesting that browsers can be more than just potential liabilities. They can be assets for enterprise environments.
Enterprises have deliberated on implementing zero trust for years, but vendors are overpromising and under-delivering on zero trust solutions. Gartner Vice President Analyst John Watts discusses the current adoption status and misunderstandings surrounding the framework.
As security and technology leaders look to reduce the complexity of their environments and condense the number of core vendors in their ecosystems, the power of platform solutions grows. John Maddison of Fortinet opens up on the power of convergence in a single operating system.
Are you up to date on recent cybersecurity events that have shaped the threat landscape so far in 2024?
Staying ahead of emerging risks is paramount for organizations striving to protect their assets and maintain operational resilience. In this discussion, Bitsight experts will examine the fallout from the...
Navigating the crowded GRC vendor market is complicated and time-consuming – there are lots of requirements to meet and lots of vendors to sort through. Consistently and efficiently evaluate your vendor shortlist across five categories and dozens of weightable features and capabilities with our GRC Buyer's Guide.
...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.