New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

What Should Cyber Security’s Role in Sourcing and Procurement Be?

When SPVM teams and security teams work together when assessing vendors, risk is properly accounted for and all parties involved are informed.

Jun 15, 2022
What should cyber security’s role in sourcing and procurement be?
blog

Prioritizing Third Party Risk Intelligence in a Managed Services Package

Modern cybersecurity programs are complex and MSSPs must include a third-party risk intelligence solution in their service offering.

Jun 3, 2022
Prioritizing Third Party Risk Intelligence in a Managed Services Package
blog

Third-party Risk Management: a Tool or a Process?

Within Enterprise Risk Management, Third-party risk has taken a new level of importance in the world of mitigation and risk processes.

May 31, 2022
Third-Party Risk Management: A Tool or a Process?
blog

Seven Questions to Ask When Assessing Security Rating Services

Thinking about exploring security ratings services, but not sure where to start? We've got you covered with our SRS assessment checklist.

May 12, 2022
Seven Questions to Ask When Assessing Security Rating Services
blog

Strong Cybersecurity Talent: the Biggest Need for Companies in 2022

As the hiring market for cybersecurity talent grows and adapts to worldwide changes, companies can adjust tactics to discover candidates in new places.

Apr 21, 2022
Strong Cybersecurity Talent: The Biggest Need for Companies in 2022
blog

The Cia Triad: a Key Part of Your Cyber Security Program

Confidentiality, Integrity, and Availability are the key principles of the CIA triad, the basis for maintaining robust information security procedures.

Apr 7, 2022
The CIA Triad: A Key Part of Your Cyber Security Program
blog

Third-party Risk Management & Cyber News

Stay up-to-date in the industry by reading our weekly bites of cyber news by Jeffrey Wheatman & Bob Maley.

Apr 1, 2022
Third-Party Risk Management & Cyber News
blog

New Federal Cybersecurity Legislation Aimed at Protecting Critical Infrastructure

New requirements for reporting data breaches and ransomware attacks aim to protect critical infrastructure and national public safety.

Mar 18, 2022
New Federal Cybersecurity Legislation Aimed at Protecting Critical Infrastructure
blog

Controls Without Enforcement: Is Zero Trust Possible?

Without alignment on standards, Zero Trust architecture has the potential to discourage gradual growth into compliance due to the daunting ask.

Mar 4, 2022
Controls without enforcement: Is Zero Trust possible?
blog

Understanding the Nist 800-160 Sp 1.1 Draft

Will NIST 800-160 SP v1.1 help federal security engineers protect against national cyber attack? Time tells all– but here’s what to know now.

Feb 25, 2022
Understanding the NIST 800-160 SP 1.1 Draft
blog

5 Ways Automation Is Revolutionizing Third Party Risk Management

Automated third-party risk management allows for speed, efficiency and accuracy of vendor risk beyond any human capability.

Feb 22, 2022
5 Ways Automation is Revolutionizing Third Party Risk Management
blog

Data Breach Access Points Hide in the Digital Supply Chain

Software publishers are targeted more than any other vendor, but this does not mean the remainder of your digital supply chain is secure. See why.

Feb 8, 2022
Data Breach Access Points Hide in the Digital Supply Chain

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.