Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ensuring Institutional AI Ownership With the AI Compliance Officer

‍Artificial intelligence (AI) systems and generative AI (GenAI) tools have already been embedded across enterprise operations in a myriad of ways that trigger compliance obligations, both in terms of AI-specific regulations and other reporting mandates. In many cases, this adoption is occurring informally, through employee-driven tools or AI features embedded within third-party platforms, without centralized visibility or approval.
Featured Post

Security's Next Turning Point Is the Workforce

Cybersecurity is entering a turning point. It has less to do with new tools than a new reality: the workforce has changed. For years, security programs assumed risk lived in systems, controls, and configurations. People were the variable managed through policies, training, and best-effort awareness. That model was already under strain. Now it is being outpaced.

Understanding Open-Source License Risk in Modern Software

Open source is one of the best things to ever happen to software development. It is also one of the easiest ways to accidentally ship legal obligations you did not sign up for. Most teams know they rely heavily on open-source dependencies. Fewer teams know exactly what licenses those dependencies use, what obligations come with them, or how those licenses travel through transitive dependencies and container images. That gap is what we call open-source license risk.

4 Predictions Our Researchers Say Could Break (or Break Through) in 2026

As we step into 2026, Bitsight researchers are closely watching key developments across the cyber risk landscape. Their insights reveal a dynamic tension between rising threats and new opportunities to strengthen defenses. Here's what they predict for the year ahead, and what security teams should be prepared to navigate.

The Data Scientist's Take: Making AI Work for the Enterprise

In retrospect, it’s a lot easier to determine whether or not something has been overhyped. But for the moment? We’re bullish on agentic systems – and their adoption. Is your enterprise ready for the age of autonomous AI? Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Ilya Mezyin (SVP, Head of Data Science, Dun & Bradstreet) for this discussion on: SecurityScorecard monitors and scores over 12 million companies worldwide. Find your company's security score for free at SecurityScorecard.com.

Meet GitGuardian's Machine Learning-Powered Risk Scoring

The GitGuardian Platform now automatically ranks every secrets incident with a risk score from 0–100, turning alert floods into a prioritized, trustworthy work queue. Scores are computed from incident context (like validity, exposure, where it was found, and exploitability) and build on existing ML capabilities like Secret Enricher and our False-Positive Remover, which cuts false positives by 80%+.

2026 Study from Panorays: 85% of CISOs Can't See Third-Party Threats Amid Increasing Supply Chain Attacks

Panorays, a leading provider of third-party security risk management software, has released the 2026 edition of its annual CISO Survey for Third-Party Cyber Risk Management. The survey highlights third-party cyber risk as one of the most critical challenges facing security leaders today, driven largely by a lack of visibility. While 60% of CISOs report an increase in third-party security incidents, only 15% say they have full visibility into those risks.

A Day Without ICS: The Overlooked ICS Risks That Could Bring Operations to a Halt

Have you ever watched AMC’s The Walking Dead? Before the walkers, before the chaos, there is a quieter moment that often goes unnoticed. The power is out. Roads are empty. Hospitals are running on borrowed time. The world has not fallen apart yet, but it is no longer working. That is what a day without ICS and OT would look like. Industrial control systems (ICS) and operational technology (OT) are the systems that run the physical world.

How to choose the best risk management software for your organization

Fast-paced changes in technologies, regulations, and growth expectations can quickly shift your risk environment. Without a structured approach to managing these risks, even the most innovative organizations can face costly disruptions, security incidents, and compliance missteps.