2021 Risk Pulse: US Federal Government Read more →

Black Kite Platform Wins Dual Risk Management Innovation Awards

Scaling third-party intelligence to prevent unrecognized risk.

For CISOs looking to quantify risk

How to reduce uncertainty around cyber risk and communicate to the board more effectively. Listen here

What Our Clients Are Saying

Radically Simple Cyber Assessments That Prevent Unrecognized Risk

Easy to Access Saas System

Operationalize with a platform that integrates with questionnaires, vendor management systems and process workflows.

Standards-based Methodology

Automate adherence to cybersecurity compliance requirements and reduce the risk of a breach with a defense in depth approach.

Proactive Support

Our Customer Success and Engineering teams have your back, even before issues surface. That’s why we’ve achieved an audited NPS of 80.

Non-intrusive Scans

The platform uses Open-Source Intelligence (OSINT) and non-intrusive cyber scans to identify potential security risks, without ever touching the target customer.

20 Categories with 400+ Controls

Vulnerabilities and attack patterns identified using 20 categories and 400+ controls, making the Black Kite platform 3x more comprehensive than competitors’.

Uncover Your Ransomware Susceptibility

The only cyber rating platform with a tool to detect the likelihood of a ransomware attack to your organization.

Exclusive Industry Insight

20% of the top 100 defense contractors are highly susceptible to a ransomware attack.

Download Report

The Black Kite Platform

Built from a Hacker’s Perspective
Risk in Financial Terms
Determines the financial impact of potential breaches for each vendor
Learn More
Technical Cyber Risk Score
Continuously monitors third-party risks and assigns an easy-to-understand letter grade to each vendor
Learn More
Questionnaire & Compliance Correlation
Correlates findings with industry standards to inform compliance requirements
Learn More

Black Kite’s platform was built to provide full visibility into a vendor’s cyber position, using the same open-source intelligence tools and techniques hackers use (data collectors, crawlers, honeypots, etc.) to continuously collect information from internet-wide scanner databases, reputation sites, cyber events, hacker shares, and known vulnerability databases.

Ransomware Threats Black Kite CEO Paul Paget Exposes “Critical Red Zone”

New Video

What CISOs should know about ransomware risk

Watch the Video

Ready to get started?