Black Kite is a finalist in the 2026 SC Awards for continued innovation and leadership in third-party cyber risk intelligence.Learn more
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Expert Insights: U.s. Federal Government Risk in 2022

Hear from our experts as they discuss the government’s role in centralizing supply chain cybersecurity and what the future holds for federal cyber regulations a...

Jul 21, 2022
blog

Spotlight on the Gramm-leach-bliley Act (glba)

Spotlight on the Gramm-Leach-Bliley Act (GLBA) - Third Party Risk Management Articles and Education from Shared Assessments

Jul 19, 2022
blog

Defend Cybersecurity Investment Amidst an Economic Downturn

In economic downturns, defending investment is imperative for remaining cyber secure and prioritizing risk level maintenance. Discover how.

Jul 14, 2022
blog

2022 Key Third-party Breaches: Healthcare Still at Major Risk

Let’s take a moment to look back, reflect, and learn from some of the key third-party breaches of 2022 where healthcare continued to be a top target.

Jul 11, 2022
blog

Have You Built a Password Fortress? – Risky Passwords of 2022

Each year, password lists are published by various companies looking to highlight the frequent, weak passwords of the last 12 months. Is yours on the list?

Jul 6, 2022
blog

Due Diligence 5-step Checklist

Third-party due diligence in 5 steps: a working checklist from Black Kite Research covering scoping, evidence, scoring, sign-off, and continuous review.

Jun 28, 2022
blog

What Should Cyber Security’s Role in Sourcing and Procurement Be?

When SPVM teams and security teams work together when assessing vendors, risk is properly accounted for and all parties involved are informed.

Jun 15, 2022
blog

Prioritizing Third Party Risk Intelligence in a Managed Services Package

Modern cybersecurity programs are complex and MSSPs must include a third-party risk intelligence solution in their service offering.

Jun 3, 2022
blog

Third-party Risk Management: a Tool or a Process?

Within Enterprise Risk Management, Third-party risk has taken a new level of importance in the world of mitigation and risk processes.

May 31, 2022
blog

Seven Questions to Ask When Assessing Security Rating Services

Thinking about exploring security ratings services, but not sure where to start? We've got you covered with our SRS assessment checklist.

May 12, 2022
blog

Strong Cybersecurity Talent: the Biggest Need for Companies in 2022

As the hiring market for cybersecurity talent grows and adapts to worldwide changes, companies can adjust tactics to discover candidates in new places.

Apr 21, 2022
blog

The Cia Triad: a Key Part of Your Cyber Security Program

Confidentiality, Integrity, and Availability are the key principles of the CIA triad, the basis for maintaining robust information security procedures.

Apr 7, 2022

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.