Black Kite Blog
A Simple Approach to Prioritizing Cyber Risk in Your Third-party Relationships
Managing third parties is time consuming and a bit overwhelming – what’s the best place to start when determining where your greatest risks lie?
Dec 23, 2022
Who Owns Cybersecurity in Supply Chain Risk Management?
Hear Wheatman's perspective on panelist answers on an IT GRC Forum webinar on supply chain risk management - who owns the risk?
Dec 19, 2022
Third-party Cyber Risk: a Guide to Your First Steps in Managing It
A crucial step in protecting your company is understanding the risks that your third-party vendors bring to the table. Let Black Kite kickstart your process.
Dec 12, 2022
Don’t Let Chaos Bring You Down
During an economic downturn, bad guys are constantly looking for ways to attack during a distraction. How can you stay vigilant during noisy chaos?
Dec 5, 2022
What Is a Brute Force Attack (and How Can You Prevent It)?
Brute force attacks use speed and smarts to quickly try many passwords - what can you and your team do to prevent this avenue of attack?
Nov 21, 2022
I Like Cheese – Please Stop Talking About Cost Cutting – Instead Focus on Cost Optimization
Cost cutting frequently results in dropping controls or tools and ends in losing layers of protection – how can we prioritize cost optimization?
Nov 11, 2022
Phishing: History, Statistics, and Prevention
Thousands of individuals are targeted every day with phishing attempts: what is it and what can you and your company do about it?
Nov 9, 2022
What Is the Difference Between Vrm, TPRM, and Supply Chain Risk Management?
Labeling risk takes a back seat to properly addressing the risk itself, but while we’re here, let's explore the nuances of what third party risk really is.
Nov 4, 2022
Time to Revamp Your Typical Password Strategy
Common passwords makes it easy for threat actors to complete credential stuffing attacks – let’s make the job more difficult and take it up a notch.
Oct 26, 2022
How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn
Are you prepared for budget cuts, hiring freezes, or layoffs while still prioritizing cyber? Find out how to maximize your budget with security in mind.
Oct 25, 2022
Why Context Matters in Security Metrics
Oct 21, 2022
Software Updates Are Not Optional
It may be easier to push software updates to the next day, indefinitely, immediate updates are a small step in the right direction of a big impact.
Oct 12, 2022