Black Kite Blog
What Should Cyber Security’s Role in Sourcing and Procurement Be?
When SPVM teams and security teams work together when assessing vendors, risk is properly accounted for and all parties involved are informed.
Jun 15, 2022
Prioritizing Third Party Risk Intelligence in a Managed Services Package
Modern cybersecurity programs are complex and MSSPs must include a third-party risk intelligence solution in their service offering.
Jun 3, 2022
Third-party Risk Management: a Tool or a Process?
Within Enterprise Risk Management, Third-party risk has taken a new level of importance in the world of mitigation and risk processes.
May 31, 2022
Seven Questions to Ask When Assessing Security Rating Services
Thinking about exploring security ratings services, but not sure where to start? We've got you covered with our SRS assessment checklist.
May 12, 2022
Strong Cybersecurity Talent: the Biggest Need for Companies in 2022
As the hiring market for cybersecurity talent grows and adapts to worldwide changes, companies can adjust tactics to discover candidates in new places.
Apr 21, 2022
The Cia Triad: a Key Part of Your Cyber Security Program
Confidentiality, Integrity, and Availability are the key principles of the CIA triad, the basis for maintaining robust information security procedures.
Apr 7, 2022
Third-party Risk Management & Cyber News
Stay up-to-date in the industry by reading our weekly bites of cyber news by Jeffrey Wheatman & Bob Maley.
Apr 1, 2022
New Federal Cybersecurity Legislation Aimed at Protecting Critical Infrastructure
New requirements for reporting data breaches and ransomware attacks aim to protect critical infrastructure and national public safety.
Mar 18, 2022
Controls Without Enforcement: Is Zero Trust Possible?
Without alignment on standards, Zero Trust architecture has the potential to discourage gradual growth into compliance due to the daunting ask.
Mar 4, 2022
Understanding the Nist 800-160 Sp 1.1 Draft
Will NIST 800-160 SP v1.1 help federal security engineers protect against national cyber attack? Time tells all– but here’s what to know now.
Feb 25, 2022
5 Ways Automation Is Revolutionizing Third Party Risk Management
Automated third-party risk management allows for speed, efficiency and accuracy of vendor risk beyond any human capability.
Feb 22, 2022
Data Breach Access Points Hide in the Digital Supply Chain
Software publishers are targeted more than any other vendor, but this does not mean the remainder of your digital supply chain is secure. See why.
Feb 8, 2022