New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Black Kite Unveils Industry’s First Monthly Ransomware Dashboards

Research offers critical insight into top ransomware groups, their victims, and the most common indicators of compromise over the past six months

Jan 24, 2023
Black Kite Unveils Industry’s First Monthly Ransomware Dashboards
blog

No More Best Practice

‘We’ve always done it that way’ is no longer justifiable in a world of constant changes and modern cyber risk. Cut best practice, for the better.

Jan 19, 2023
No More Best Practice
blog

Do You Sbom [software Bill of Materials], Brah?

SBOMs have gotten increased focus due to a high-profile software vulnerabilities - why is this the new most important thing to focus on?

Jan 12, 2023
Do You Sbom [Software Bill of Materials], Brah?
blog

Do Your Executives Really Understand the Risk of Cybersecurity in Your Supply Chain?

Executives need to understand cybersecurity as a quantifiable business risk. It’s important – let’s shift the conversation to why it's important.

Jan 6, 2023
Do Your Executives Really Understand the Risk of Cybersecurity in Your Supply Chain?
blog

A Simple Approach to Prioritizing Cyber Risk in Your Third-party Relationships

Managing third parties is time consuming and a bit overwhelming – what’s the best place to start when determining where your greatest risks lie?

Dec 23, 2022
A Simple Approach to Prioritizing Cyber Risk in Your Third-Party Relationships
blog

Who Owns Cybersecurity in Supply Chain Risk Management?

Hear Wheatman's perspective on panelist answers on an IT GRC Forum webinar on supply chain risk management - who owns the risk?

Dec 19, 2022
Who Owns Cybersecurity in Supply Chain Risk Management?
blog

Third-party Cyber Risk: a Guide to Your First Steps in Managing It

A crucial step in protecting your company is understanding the risks that your third-party vendors bring to the table. Let Black Kite kickstart your process.

Dec 12, 2022
Third-Party Cyber Risk: A Guide to Your First Steps in Managing It
blog

Don’t Let Chaos Bring You Down

During an economic downturn, bad guys are constantly looking for ways to attack during a distraction. How can you stay vigilant during noisy chaos?

Dec 5, 2022
Don’t Let Chaos Bring You Down
blog

What Is a Brute Force Attack (and How Can You Prevent It)?

Brute force attacks use speed and smarts to quickly try many passwords - what can you and your team do to prevent this avenue of attack?

Nov 21, 2022
What Is a Brute Force Attack (And How Can You Prevent It)?
blog

I Like Cheese – Please Stop Talking About Cost Cutting – Instead Focus on Cost Optimization

Cost cutting frequently results in dropping controls or tools and ends in losing layers of protection – how can we prioritize cost optimization?

Nov 11, 2022
I Like Cheese – Please Stop Talking About Cost Cutting – Instead Focus On Cost Optimization
blog

Phishing: History, Statistics, and Prevention

Thousands of individuals are targeted every day with phishing attempts: what is it and what can you and your company do about it?

Nov 9, 2022
Phishing: History, Statistics, and Prevention
blog

What Is the Difference Between Vrm, TPRM, and Supply Chain Risk Management?

Labeling risk takes a back seat to properly addressing the risk itself, but while we’re here, let's explore the nuances of what third party risk really is.

Nov 4, 2022
What is the difference between VRM, TPRM, and Supply Chain Risk Management?

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.