New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

A Simple Approach to Prioritizing Cyber Risk in Your Third-party Relationships

Managing third parties is time consuming and a bit overwhelming – what’s the best place to start when determining where your greatest risks lie?

Dec 23, 2022
A Simple Approach to Prioritizing Cyber Risk in Your Third-Party Relationships
blog

Who Owns Cybersecurity in Supply Chain Risk Management?

Hear Wheatman's perspective on panelist answers on an IT GRC Forum webinar on supply chain risk management - who owns the risk?

Dec 19, 2022
Who Owns Cybersecurity in Supply Chain Risk Management?
blog

Third-party Cyber Risk: a Guide to Your First Steps in Managing It

A crucial step in protecting your company is understanding the risks that your third-party vendors bring to the table. Let Black Kite kickstart your process.

Dec 12, 2022
Third-Party Cyber Risk: A Guide to Your First Steps in Managing It
blog

Don’t Let Chaos Bring You Down

During an economic downturn, bad guys are constantly looking for ways to attack during a distraction. How can you stay vigilant during noisy chaos?

Dec 5, 2022
Don’t Let Chaos Bring You Down
blog

What Is a Brute Force Attack (and How Can You Prevent It)?

Brute force attacks use speed and smarts to quickly try many passwords - what can you and your team do to prevent this avenue of attack?

Nov 21, 2022
What Is a Brute Force Attack (And How Can You Prevent It)?
blog

I Like Cheese – Please Stop Talking About Cost Cutting – Instead Focus on Cost Optimization

Cost cutting frequently results in dropping controls or tools and ends in losing layers of protection – how can we prioritize cost optimization?

Nov 11, 2022
I Like Cheese – Please Stop Talking About Cost Cutting – Instead Focus On Cost Optimization
blog

Phishing: History, Statistics, and Prevention

Thousands of individuals are targeted every day with phishing attempts: what is it and what can you and your company do about it?

Nov 9, 2022
Phishing: History, Statistics, and Prevention
blog

What Is the Difference Between Vrm, TPRM, and Supply Chain Risk Management?

Labeling risk takes a back seat to properly addressing the risk itself, but while we’re here, let's explore the nuances of what third party risk really is.

Nov 4, 2022
What is the difference between VRM, TPRM, and Supply Chain Risk Management?
blog

Time to Revamp Your Typical Password Strategy

Common passwords makes it easy for threat actors to complete credential stuffing attacks – let’s make the job more difficult and take it up a notch.

Oct 26, 2022
Time to Revamp Your Typical Password Strategy
blog

How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn

Are you prepared for budget cuts, hiring freezes, or layoffs while still prioritizing cyber? Find out how to maximize your budget with security in mind.

Oct 25, 2022
How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn
blog

Why Context Matters in Security Metrics

Oct 21, 2022
Why Context Matters in Security Metrics
blog

Software Updates Are Not Optional

It may be easier to push software updates to the next day, indefinitely, immediate updates are a small step in the right direction of a big impact.

Oct 12, 2022
Software Updates Are Not Optional

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.