Black Kite Blog
Time to Revamp Your Typical Password Strategy
Common passwords makes it easy for threat actors to complete credential stuffing attacks – let’s make the job more difficult and take it up a notch.
Oct 26, 2022
How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn
Are you prepared for budget cuts, hiring freezes, or layoffs while still prioritizing cyber? Find out how to maximize your budget with security in mind.
Oct 25, 2022
Why Context Matters in Security Metrics
Oct 21, 2022
Software Updates Are Not Optional
It may be easier to push software updates to the next day, indefinitely, immediate updates are a small step in the right direction of a big impact.
Oct 12, 2022
Should Operational Security Be Discussed with the Board?
It is time to change our methods and report metrics to the board that are operational, yet, target-based and clearly tied to business goals.
Oct 6, 2022
It’s Time to Make Multi-factor Authentication (mfa) Part of Your Daily Routine
One of the four focuses this year for cybersecurity awareness month is implementing multi-factor authentication. Let’s discuss it!
Oct 5, 2022
How to Prioritize Security When Executives Are Focused on Business Growth
Labeling risk takes a back seat to properly addressing the risk itself, let's explore the nuances of what third party risk really is.
Sep 29, 2022
Do Grc Requirements Truly Reduce Risk?
When GRC requirements tend to be more compliance based, rather than risk reduction forward, what actions can you take to facilitate better risk management?
Sep 9, 2022
Ciso on the Road with Bob Maley
At each CISO Exec Net, CISOs from different companies meet up and discuss the most pressing and top-of-mind topics together.
Aug 3, 2022
Cybersecurity Rating Vs. Penetration Testing (pen Test)
IT leaders are responsible for keeping digital and informational assets safe and secure. Protecting employees and client data should be a priority.
Jul 22, 2022
Expert Insights: U.s. Federal Government Risk in 2022
Hear from our experts as they discuss the government’s role in centralizing supply chain cybersecurity and what the future holds for federal cyber regulations a...
Jul 21, 2022
Spotlight on the Gramm-leach-bliley Act (glba)
Spotlight on the Gramm-Leach-Bliley Act (GLBA) - Third Party Risk Management Articles and Education from Shared Assessments
Jul 19, 2022