New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Should Operational Security Be Discussed with the Board?

It is time to change our methods and report metrics to the board that are operational, yet, target-based and clearly tied to business goals.

Oct 6, 2022
Should Operational Security Be Discussed With the Board?
blog

It’s Time to Make Multi-factor Authentication (mfa) Part of Your Daily Routine

One of the four focuses this year for cybersecurity awareness month is implementing multi-factor authentication. Let’s discuss it!

Oct 5, 2022
It’s Time to Make Multi-Factor Authentication (MFA) Part of Your Daily Routine
blog

How to Prioritize Security When Executives Are Focused on Business Growth

Labeling risk takes a back seat to properly addressing the risk itself, let's explore the nuances of what third party risk really is.

Sep 29, 2022
How to prioritize security when executives are focused on business growth
blog

Do Grc Requirements Truly Reduce Risk?

When GRC requirements tend to be more compliance based, rather than risk reduction forward, what actions can you take to facilitate better risk management?

Sep 9, 2022
Do GRC Requirements Truly Reduce Risk?
blog

Ciso on the Road with Bob Maley

At each CISO Exec Net, CISOs from different companies meet up and discuss the most pressing and top-of-mind topics together.

Aug 3, 2022
CISO on the Road with Bob Maley
blog

Cybersecurity Rating Vs. Penetration Testing (pen Test)

IT leaders are responsible for keeping digital and informational assets safe and secure. Protecting employees and client data should be a priority.

Jul 22, 2022
Cybersecurity Rating vs. Penetration Testing (Pen Test)
blog

Expert Insights: U.s. Federal Government Risk in 2022

Hear from our experts as they discuss the government’s role in centralizing supply chain cybersecurity and what the future holds for federal cyber regulations a...

Jul 21, 2022
Expert Insights: U.S. Federal Government Risk in 2022
blog

Spotlight on the Gramm-leach-bliley Act (glba)

Spotlight on the Gramm-Leach-Bliley Act (GLBA) - Third Party Risk Management Articles and Education from Shared Assessments

Jul 19, 2022
Spotlight on the Gramm-Leach-Bliley Act (GLBA)
blog

Defend Cybersecurity Investment Amidst an Economic Downturn

In economic downturns, defending investment is imperative for remaining cyber secure and prioritizing risk level maintenance. Discover how.

Jul 14, 2022
Defend Cybersecurity Investment Amidst an Economic Downturn
blog

2022 Key Third-party Breaches: Healthcare Still at Major Risk

Let’s take a moment to look back, reflect, and learn from some of the key third-party breaches of 2022 where healthcare continued to be a top target.

Jul 11, 2022
2022 Key Third-Party Breaches: Healthcare Still At Major Risk
blog

Have You Built a Password Fortress? – Risky Passwords of 2022

Each year, password lists are published by various companies looking to highlight the frequent, weak passwords of the last 12 months. Is yours on the list?

Jul 6, 2022
Have You Built a Password Fortress? – Risky Passwords of 2022
blog

Due Diligence 5-step Checklist

Let’s understand what third-party due diligence is about and walk through the steps for an effective due diligence process.

Jun 28, 2022
Due Diligence 5-Step Checklist

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.