New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Simplifying Vendor Security Assessments, Part Ii: Questions to Ask Along the Road

Now that you've created your vendor security assessment roadmap, get ready to ask questions along the road. Start your journey here.

Jul 21, 2021
SIMPLIFYING VENDOR SECURITY ASSESSMENTS, PART II: Questions to Ask Along the Road
blog

Simplifying Vendor Risk Assessments, Part I: Designing Your Vra Roadmap

Vendor risk assessments don't have to be complicated in order to be effective. Discover the five steps to creating your VRA roadmap.

Jul 16, 2021
SIMPLIFYING VENDOR RISK ASSESSMENTS, PART I: Designing Your VRA Roadmap
blog

The Top Five Third-party Data Breaches in June 2021, Revealed

Data breaches in June targeted automative manufacturers first, with both Volkswagen and Mercedes-Benz' customer data leaked, impacting millions.

Jul 8, 2021
The Top Five Third-Party Data Breaches in June 2021, Revealed
blog

Ransomware Day Strikes Again: What Kaseya Should Teach Us

Ransomware groups are constantly improving their strategy, but these attacks are not brand new, we must become stronger than the bad actors.

Jul 7, 2021
Ransomware Day Strikes Again: What Kaseya Should Teach Us
blog

The Most Common Cybersecurity Threats Facing Supply Chains in 2021

As we enter the second half of 2021 and reflect back on the previous six months, it’s clear that all eyes are now on supply chain security.

Jun 30, 2021
The Most Common Cybersecurity Threats Facing Supply Chains in 2021
blog

Four Cybersecurity Tips for Navigating to a Hybrid Work Environment

Today's new work model requires new security measures. Keep your organization and your employees safe with these tips for managing a hybrid work model

Jun 16, 2021
Four Cybersecurity Tips for Navigating to a Hybrid Work Environment
blog

How to Create an Effective Cyber Incident Response Plan

The 5 steps to an effective incident response plan: Preparation, detection, containment, analysis and recovery.

Jun 9, 2021
How to Create an Effective Cyber Incident Response Plan
blog

How Protected Are You Against Ransomware?

By the time you're done reading this sentence, another ransomware attack will have occurred. Is your organization on the hit list?

May 25, 2021
How Protected Are You Against Ransomware?
blog

Three Assumptions You Should Never Make About Ransomware

History repeats itself. Avoid becoming the next ransomware headline by learning from victim's critical mistakes with tips from CSO Bob Maley.

May 20, 2021
Three Assumptions You Should Never Make About Ransomware
blog

A Preview of the 2021 Manufacturing Risk Pulse: Consumer Packaged Goods

At first glance, it looks like CPG manufacturers are hitting the mark when it comes to third-party risk management.

May 12, 2021
A Preview of the 2021 Manufacturing Risk Pulse: Consumer Packaged Goods
blog

Top Five Third-party Breaches in April 2021: Hackers Bite From Apple, Airlines Hit Turbulence & More

Hackers take a bite from Apple, airlines hit turbulence and more from last month's major breaches.

May 4, 2021
Top Five Third-Party Breaches in April 2021: Hackers Bite from Apple, Airlines Hit Turbulence & More
blog

The “whac-a-mole” Game Between Cybercriminals and Security Teams

By the time we come to understand the full magnitude of one cyberattack, we're already knee deep in another.It's time we act faster.

Apr 29, 2021
The “Whac-A-Mole” Game Between Cybercriminals and Security Teams

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.