New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Time to Revamp Your Typical Password Strategy

Common passwords makes it easy for threat actors to complete credential stuffing attacks – let’s make the job more difficult and take it up a notch.

Oct 26, 2022
Time to Revamp Your Typical Password Strategy
blog

How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn

Are you prepared for budget cuts, hiring freezes, or layoffs while still prioritizing cyber? Find out how to maximize your budget with security in mind.

Oct 25, 2022
How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn
blog

Why Context Matters in Security Metrics

Oct 21, 2022
Why Context Matters in Security Metrics
blog

Software Updates Are Not Optional

It may be easier to push software updates to the next day, indefinitely, immediate updates are a small step in the right direction of a big impact.

Oct 12, 2022
Software Updates Are Not Optional
blog

Should Operational Security Be Discussed with the Board?

It is time to change our methods and report metrics to the board that are operational, yet, target-based and clearly tied to business goals.

Oct 6, 2022
Should Operational Security Be Discussed With the Board?
blog

It’s Time to Make Multi-factor Authentication (mfa) Part of Your Daily Routine

One of the four focuses this year for cybersecurity awareness month is implementing multi-factor authentication. Let’s discuss it!

Oct 5, 2022
It’s Time to Make Multi-Factor Authentication (MFA) Part of Your Daily Routine
blog

How to Prioritize Security When Executives Are Focused on Business Growth

Labeling risk takes a back seat to properly addressing the risk itself, let's explore the nuances of what third party risk really is.

Sep 29, 2022
How to prioritize security when executives are focused on business growth
blog

Do Grc Requirements Truly Reduce Risk?

When GRC requirements tend to be more compliance based, rather than risk reduction forward, what actions can you take to facilitate better risk management?

Sep 9, 2022
Do GRC Requirements Truly Reduce Risk?
blog

Ciso on the Road with Bob Maley

At each CISO Exec Net, CISOs from different companies meet up and discuss the most pressing and top-of-mind topics together.

Aug 3, 2022
CISO on the Road with Bob Maley
blog

Cybersecurity Rating Vs. Penetration Testing (pen Test)

IT leaders are responsible for keeping digital and informational assets safe and secure. Protecting employees and client data should be a priority.

Jul 22, 2022
Cybersecurity Rating vs. Penetration Testing (Pen Test)
blog

Expert Insights: U.s. Federal Government Risk in 2022

Hear from our experts as they discuss the government’s role in centralizing supply chain cybersecurity and what the future holds for federal cyber regulations a...

Jul 21, 2022
Expert Insights: U.S. Federal Government Risk in 2022
blog

Spotlight on the Gramm-leach-bliley Act (glba)

Spotlight on the Gramm-Leach-Bliley Act (GLBA) - Third Party Risk Management Articles and Education from Shared Assessments

Jul 19, 2022
Spotlight on the Gramm-Leach-Bliley Act (GLBA)

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.