Black Kite Blog
Phishing: History, Statistics, and Prevention
Thousands of individuals are targeted every day with phishing attempts: what is it and what can you and your company do about it?
Nov 9, 2022
What Is the Difference Between Vrm, TPRM, and Supply Chain Risk Management?
Labeling risk takes a back seat to properly addressing the risk itself, but while we’re here, let's explore the nuances of what third party risk really is.
Nov 4, 2022
Time to Revamp Your Typical Password Strategy
Common passwords makes it easy for threat actors to complete credential stuffing attacks – let’s make the job more difficult and take it up a notch.
Oct 26, 2022
How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn
Are you prepared for budget cuts, hiring freezes, or layoffs while still prioritizing cyber? Find out how to maximize your budget with security in mind.
Oct 25, 2022
Why Context Matters in Security Metrics
Oct 21, 2022
Software Updates Are Not Optional
It may be easier to push software updates to the next day, indefinitely, immediate updates are a small step in the right direction of a big impact.
Oct 12, 2022
Should Operational Security Be Discussed with the Board?
It is time to change our methods and report metrics to the board that are operational, yet, target-based and clearly tied to business goals.
Oct 6, 2022
It’s Time to Make Multi-factor Authentication (mfa) Part of Your Daily Routine
One of the four focuses this year for cybersecurity awareness month is implementing multi-factor authentication. Let’s discuss it!
Oct 5, 2022
How to Prioritize Security When Executives Are Focused on Business Growth
Labeling risk takes a back seat to properly addressing the risk itself, let's explore the nuances of what third party risk really is.
Sep 29, 2022
Do Grc Requirements Truly Reduce Risk?
When GRC requirements tend to be more compliance based, rather than risk reduction forward, what actions can you take to facilitate better risk management?
Sep 9, 2022
Ciso on the Road with Bob Maley
At each CISO Exec Net, CISOs from different companies meet up and discuss the most pressing and top-of-mind topics together.
Aug 3, 2022
Cybersecurity Rating Vs. Penetration Testing (pen Test)
IT leaders are responsible for keeping digital and informational assets safe and secure. Protecting employees and client data should be a priority.
Jul 22, 2022