New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

5 Ways Automation Is Revolutionizing Third Party Risk Management

Automated third-party risk management allows for speed, efficiency and accuracy of vendor risk beyond any human capability.

Feb 22, 2022
5 Ways Automation is Revolutionizing Third Party Risk Management
blog

Data Breach Access Points Hide in the Digital Supply Chain

Software publishers are targeted more than any other vendor, but this does not mean the remainder of your digital supply chain is secure. See why.

Feb 8, 2022
Data Breach Access Points Hide in the Digital Supply Chain
blog

Ciox Health Breach Impacts 30+ Institutions: Why Does Healthcare Continue to Be Targeted in 2022?

Ciox Health discloses 2021 data breach to customers six months later in a world where healthcare remains the number one target of attack. Learn why.

Feb 4, 2022
Ciox Health breach impacts 30+ institutions: Why does healthcare continue to be targeted in 2022?
blog

Cmmc 2.0: Compliance Made Simpler for Dod Contractors

Do you want to know about Cybersecurity Maturity Model Certification? We answered your questions about CMMC.

Feb 3, 2022
CMMC 2.0: Compliance Made Simpler for DoD Contractors
blog

Devil in the Details: How to Address Third-party Risks

Address gaps and security issues in your vendor risk management by diving into the details, despite maintaining a good cyber rating at first glance.

Jan 20, 2022
Devil in the Details: How to Address Third-Party Risks
blog

Reputational Cyber Risk – How to Avoid Business Loss

Managing reputational risk goes hand-in-hand with monitoring third party risk and maintaining strong cyber posture within the threat landscape.

Jan 13, 2022
Reputational Cyber Risk – How to Avoid Business Loss
blog

New Year’s Resolutions for 2022: Cyber Risk Learnings

Look back on cybersecurity learnings from 2021 and into the future of 2022, with predictions and statistics on ransomware and vendor risk management.

Jan 4, 2022
New Year’s Resolutions for 2022: Cyber Risk Learnings
blog

Are Your Third Parties Pci-compliant?

Awareness of PCI-compliance both internally and throughout your cyber ecosystem is crucial to ensuring the security of sensitive cardholder data.

Dec 28, 2021
Are Your Third Parties PCI-Compliant?
blog

1.2 Million Customer Records Leaked in Godaddy Data Breach

A third-party data breach left more than 1 million GoDaddy customer records exposed. Uncover the root cause and how victims can protect themselves.

Nov 29, 2021
1.2 MILLION CUSTOMER RECORDS LEAKED IN GODADDY DATA BREACH
blog

Fbi Issues Ransomware Warning for Mergers and Acquisitions

The FBI's recent PIN warning addresses the malicious intent to expose info by ransomware gangs targeting specific firms with time sensitive pressure.

Nov 9, 2021
FBI Issues Ransomware Warning for Mergers and Acquisitions
blog

Cyber Risk in Financial Terms: Why Open Fair™ Is the Gold Standard

Discover the missing piece of your risk management framework: Risk quantification with Open FAIR™.

Oct 25, 2021
CYBER RISK IN FINANCIAL TERMS: WHY Open FAIR™ IS THE GOLD STANDARD
blog

What Is Phishing? Tips to Identify and Prevent Cyber Scams

How can organizations ‘Fight the Phish’? We share exactly what to look for in fraudulent emails, websites, texts and more.

Oct 14, 2021
What is Phishing? Tips to Identify and Prevent Cyber Scams

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.