Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Remediation Made Easy: Reducing Risks and Driving Vendor Action

Managing the vendor remediation process is no small feat. While on the surface, it might seem like the bulk of the heavy lifting is done once you complete your initial assessment, you (and every other security team on the planet) know this couldn’t be further from the truth. After all, if your team doesn’t constantly track remediation efforts and validate corrective actions, how else are you supposed to ensure vendors effectively mitigate the risks you identified?

GPSec Boston 2025 - CTEM: How to Start When You Haven't Started

What does it really take to start a Continuous Threat Exposure Management (CTEM) program—especially if your organization hasn’t formally begun? In this GPSec Boston 2025 session, Scott Kuffer, COO and Co-founder of Nucleus Security, joins Chris Peltz, Director of Security Strategy at GuidePoint Security, to demystify CTEM by stripping away the buzzwords and breaking down the practical steps for getting started.

POAM Process Automation: Breaking the Manual Grind

Plans of Action and Milestones (POAM) play a critical role in public sector cybersecurity. In this webinar with government IT solutions provider Carahsoft, we break down the challenges security teams face when implementing POAMs, sharing real-life examples of where things go wrong and why. As part of the presentation, we also cover the intensive math of POAM programs: people, systems, and time.

Automated Risk Assessment Tools

As a CISO or security lead in a SaaS organization, the unthinkable could happen to you at any time. On a Friday evening, as you’re wrapping up work, you get a notification alerting you of a potential vulnerability in a customer-facing application. You have no idea what data has been leaked or how long this has been left exposed.

ISO 31000 vs. COSO ERM frameworks - Navigating the risk landscape

In an era where uncertainty is the norm, strong risk management isn’t just good practice – it’s a competitive advantage. For technology leaders steering organizations through complex challenges, two frameworks consistently rise to the top: ISO 31000 and the COSO Enterprise Risk Management (ERM) framework. Knowing how they differ – and where each shines – is key to building resilience and making smarter, strategy-aligned decisions.

Continuous Threat Exposure Management and the Role of Exposure Assessment Platforms

Traditional vulnerability management is broken. It is ineffective. The process of scanning for software vulnerabilities, prioritizing based on CVSS scores, and fixing what you can has become an endless patch cycle. The need for a better approach is clear. Different scanning tools are creating millions of alerts, obscuring critical risks within the noise. Organizations need to go beyond finding and patching vulnerabilities and opt in to a more effective approach to managing exposures.

How do EDR tools improve cyber security and threat response?

To keep pace with the scale and sophistication of cyber threats, organizations are re-evaluating how they secure the most common attack surface the endpoint. From laptops and servers to mobile devices, endpoints serve as entry points into business-critical systems. This is why Endpoint Detection and Response (EDR) tools are fast becoming a foundational layer in modern cyber defence strategies.

What to Expect from Bitsight's 2025 Ratings Algorithm Update

In anticipation of Bitsight’s upcoming 2025 Ratings Algorithm Update (RAU), many organizations are eager to learn more about what to expect from the changes. We are excited to share that the update will be ready for preview on April 8th in the Bitsight applications so that everyone can proactively prepare for the RAU.