Black Kite Blog
Expert Insights: U.s. Federal Government Risk in 2022
Hear from our experts as they discuss the government’s role in centralizing supply chain cybersecurity and what the future holds for federal cyber regulations a...
Jul 21, 2022Spotlight on the Gramm-leach-bliley Act (glba)
Spotlight on the Gramm-Leach-Bliley Act (GLBA) - Third Party Risk Management Articles and Education from Shared Assessments
Jul 19, 2022Defend Cybersecurity Investment Amidst an Economic Downturn
In economic downturns, defending investment is imperative for remaining cyber secure and prioritizing risk level maintenance. Discover how.
Jul 14, 20222022 Key Third-party Breaches: Healthcare Still at Major Risk
Let’s take a moment to look back, reflect, and learn from some of the key third-party breaches of 2022 where healthcare continued to be a top target.
Jul 11, 2022Have You Built a Password Fortress? – Risky Passwords of 2022
Each year, password lists are published by various companies looking to highlight the frequent, weak passwords of the last 12 months. Is yours on the list?
Jul 6, 2022Due Diligence 5-step Checklist
Third-party due diligence in 5 steps: a working checklist from Black Kite Research covering scoping, evidence, scoring, sign-off, and continuous review.
Jun 28, 2022What Should Cyber Security’s Role in Sourcing and Procurement Be?
When SPVM teams and security teams work together when assessing vendors, risk is properly accounted for and all parties involved are informed.
Jun 15, 2022Prioritizing Third Party Risk Intelligence in a Managed Services Package
Modern cybersecurity programs are complex and MSSPs must include a third-party risk intelligence solution in their service offering.
Jun 3, 2022Third-party Risk Management: a Tool or a Process?
Within Enterprise Risk Management, Third-party risk has taken a new level of importance in the world of mitigation and risk processes.
May 31, 2022Seven Questions to Ask When Assessing Security Rating Services
Thinking about exploring security ratings services, but not sure where to start? We've got you covered with our SRS assessment checklist.
May 12, 2022Strong Cybersecurity Talent: the Biggest Need for Companies in 2022
As the hiring market for cybersecurity talent grows and adapts to worldwide changes, companies can adjust tactics to discover candidates in new places.
Apr 21, 2022The Cia Triad: a Key Part of Your Cyber Security Program
Confidentiality, Integrity, and Availability are the key principles of the CIA triad, the basis for maintaining robust information security procedures.
Apr 7, 2022