New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Why Cyber Risk Quantification Is the New ‘best Practice’

Third party risk management practices aren’t quite hitting the mark. What can you do to properly assess risk for your organization?

Mar 15, 2023
Why Cyber Risk Quantification Is the New ‘Best Practice’
blog

Cascading and Concentration Risk: How Do They Impact Your Digital Supply Chain?

The effect of cascading and concentration risk on the functionality of your business’ supply chain is essential in your cybersecurity program.

Mar 14, 2023
CASCADING AND CONCENTRATION RISK: HOW DO THEY IMPACT YOUR DIGITAL SUPPLY CHAIN?
blog

How Does Black Kite Calculate Cybersecurity Ratings?

What if we told you that Black Kite’s process of calculating cybersecurity ratings is a lot like sorting a giant bowl of M&M’s?

Mar 9, 2023
How Does Black Kite Calculate Cybersecurity Ratings?
blog

What Is Hecvat and How Is Black Kite Leveraging Automation to Transform the Vrm Process?

HECVAT is key for higher edu VRM. Experience a fully automated, immediate assessment of HECVAT compliance for a vendor using the Black Kite platform.

Mar 7, 2023
What is HECVAT and how is Black Kite leveraging automation to transform the VRM process?
blog

Dora Is Top of Mind, and We Aren’t Talking About the Explorer

For financial institutions, third-party risk is topping the list of active threats. The new EU Digital Operational Resilience Act exists to strengthen their def...

Mar 6, 2023
DORA is top of mind, and we aren’t talking about the Explorer
blog

What Is a Third-party Risk Assessment, and Why Do They Matter?

Learn why assessing risk to protect your business from disaster is crucial.

Mar 2, 2023
What is a Third-Party Risk Assessment, and Why Do They Matter?
blog

What Is Third-party Cyber Risk?

Learn how to protect against third-party attacks and communicate the risk they pose to prevent lost revenue, time, customer trust, and brand reputation.

Feb 28, 2023
What is Third-Party Cyber Risk?
blog

Are Cuts Inevitable, or Is Cybersecurity Recession Proof?

Recessions tend to play out the same way. Leaders think they're in the clear until.. they're not. How should cybersecurity teams approach the change in the econ...

Feb 27, 2023
Are Cuts Inevitable, or is Cybersecurity Recession Proof?
blog

The Three Most Common Ways Bad Actors Target Your Digital Supply Chain

Learn about the three primary strategies that bad actors use to attack your digital supply chain – and what a breach could cost you.

Feb 23, 2023
The Three Most Common Ways Bad Actors Target Your Digital Supply Chain
blog

Risk and Reels Goes Live – Hear From Jeffrey Wheatman on Starting a Podcast

Introducing Risk and Reels: A Cybersecurity Podcast. Learn the inspiration behind the podcast from the host himself, Jeffrey Wheatman.

Feb 9, 2023
Risk and Reels Goes Live – Hear From Jeffrey Wheatman on Starting a Podcast
blog

Third Party Breach Report Commentary From Jeffrey Wheatman

What are my thoughts on the insights of last year’s third party attacks? Numbers always tell a story. How will leaders react to that story?

Jan 31, 2023
Third Party Breach Report Commentary from Jeffrey Wheatman
blog

Don’t Ignore the Smaller Partners in Your Third-party Risk Ecosystem

Big vendors you work with aren’t necessarily the riskiest - see why you need to pay attention to your sneaky small third parties (and their vendors).

Jan 25, 2023
Don’t Ignore the Smaller Partners in Your Third-Party Risk Ecosystem

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.