New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Third-party Attack on Cryptocurrency Exchange Gate.io

One of the largest cryptocurrency exchange, gate.io, was targeted by a third-party, aka supply-chain attack.

Nov 12, 2018
Third-Party Attack on Cryptocurrency Exchange Gate.io
blog

Major Third-party Breaches Revealed in October 2018

We regularly update the list of major third-party (aka supply-chain) attacks and breaches that are revealed in October 2018.

Nov 5, 2018
Major third-party breaches revealed in October 2018
blog

Reduce Your Cyber Exposure to Mitigate Your Cyber Risk

Explore how digital transformation enhances business efficiency while addressing the rising cyber risks associated with cloud services and IoT systems

Nov 4, 2018
Reduce Your Cyber Exposure to Mitigate Your Cyber Risk
blog

Open Invitation to Hackers: Misconfigured Cloud Servers

Many companies use cloud servers to store their data Misconfigured servers may expose sensitive data, a mistake which is an open invitation to hackers

Oct 21, 2018
Open Invitation to Hackers: Misconfigured Cloud Servers
blog

Check Whether Your Ip Assets Are Blacklisted or Not for Free

To learn whether your company’s IP addresses are blacklisted, check Black Kite’s free IP Blacklist Search service.

Oct 16, 2018
Check Whether Your IP Assets Are Blacklisted Or Not For Free
blog

Major Third-party Breaches Revealed in September 2018

We regularly update the list of major third-party (aka supply-chain) attacks and breaches that are revealed in September 2018.

Oct 10, 2018
Major Third-Party Breaches Revealed in September 2018
blog

Free Gdpr Compliance Checker

See the compliance levels of your organization according to GDPR standards.

Sep 15, 2018
Free GDPR Compliance Checker
blog

British Airways Breach: Is It a Third-party Attack?

British Airways announced that 380,000 customer records containing credit card details had been taken during the cyber attack executed.

Sep 11, 2018
British Airways Breach: Is it a third-party attack?
blog

Your Company Accounts May Be Breached. Find Out with Free Account Breach Search

Employees may use their same credentials (e-mail/username/password) used in their company accounts to register third-party services.

Sep 10, 2018
Your company accounts may be breached. Find out with Free Account Breach Search
blog

How to Prevent Software Supply-chain Attacks

Do you want to learn about how to prevent software supply chain attacks? Learn your supply-chain risk before it’s too late.

Sep 2, 2018
How to Prevent Software Supply-Chain Attacks
blog

Do You Monitor Your Suppliers? Iso/iec 27001 Regulations Say You Should

Suppliers have become one of the weaker links in the system. thus, they should be constantly monitored as ISO 27001 standard suggests.

Aug 24, 2018
Do You Monitor Your Suppliers? ISO/IEC 27001 Regulations Say You Should
blog

Third-party Risk Management From Cobit’s Perspective

Black Kite Cyber Risk Scorecard check compliance to well-known cyber security frameworks including COBIT framework.

Aug 24, 2018
Third-Party Risk Management from COBIT’s perspective

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.