New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Phishing: History, Statistics, and Prevention

Thousands of individuals are targeted every day with phishing attempts: what is it and what can you and your company do about it?

Nov 9, 2022
Phishing: History, Statistics, and Prevention
blog

What Is the Difference Between Vrm, TPRM, and Supply Chain Risk Management?

Labeling risk takes a back seat to properly addressing the risk itself, but while we’re here, let's explore the nuances of what third party risk really is.

Nov 4, 2022
What is the difference between VRM, TPRM, and Supply Chain Risk Management?
blog

Time to Revamp Your Typical Password Strategy

Common passwords makes it easy for threat actors to complete credential stuffing attacks – let’s make the job more difficult and take it up a notch.

Oct 26, 2022
Time to Revamp Your Typical Password Strategy
blog

How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn

Are you prepared for budget cuts, hiring freezes, or layoffs while still prioritizing cyber? Find out how to maximize your budget with security in mind.

Oct 25, 2022
How to Conduct Cost Optimization and Remain Cyber Safe During an Economic Downturn
blog

Why Context Matters in Security Metrics

Oct 21, 2022
Why Context Matters in Security Metrics
blog

Software Updates Are Not Optional

It may be easier to push software updates to the next day, indefinitely, immediate updates are a small step in the right direction of a big impact.

Oct 12, 2022
Software Updates Are Not Optional
blog

Should Operational Security Be Discussed with the Board?

It is time to change our methods and report metrics to the board that are operational, yet, target-based and clearly tied to business goals.

Oct 6, 2022
Should Operational Security Be Discussed With the Board?
blog

It’s Time to Make Multi-factor Authentication (mfa) Part of Your Daily Routine

One of the four focuses this year for cybersecurity awareness month is implementing multi-factor authentication. Let’s discuss it!

Oct 5, 2022
It’s Time to Make Multi-Factor Authentication (MFA) Part of Your Daily Routine
blog

How to Prioritize Security When Executives Are Focused on Business Growth

Labeling risk takes a back seat to properly addressing the risk itself, let's explore the nuances of what third party risk really is.

Sep 29, 2022
How to prioritize security when executives are focused on business growth
blog

Do Grc Requirements Truly Reduce Risk?

When GRC requirements tend to be more compliance based, rather than risk reduction forward, what actions can you take to facilitate better risk management?

Sep 9, 2022
Do GRC Requirements Truly Reduce Risk?
blog

Ciso on the Road with Bob Maley

At each CISO Exec Net, CISOs from different companies meet up and discuss the most pressing and top-of-mind topics together.

Aug 3, 2022
CISO on the Road with Bob Maley
blog

Cybersecurity Rating Vs. Penetration Testing (pen Test)

IT leaders are responsible for keeping digital and informational assets safe and secure. Protecting employees and client data should be a priority.

Jul 22, 2022
Cybersecurity Rating vs. Penetration Testing (Pen Test)

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.