New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

3rd Party Vendors of Healthcare Providers Must Meet Hipaa Regulations

The HIPAA aims to protect health-related and personal information of individuals, including medical records, health insurance data, SSNs, etc.

Aug 13, 2018
3rd Party Vendors of Healthcare Providers Must Meet HIPAA Regulations
blog

How Strong Is Your Ssl/tls? 6 Simple Steps to Make It Stronger

Do you want to learn about how strong your SSL/TLS is? Here are the 6 simple steps to make it stronger.

Jul 31, 2018
How Strong is Your SSL/TLS? 6 Simple Steps to Make it Stronger
blog

Lesson From Ticketmaster Breach: Cdn Security of Third-party Suppliers

UK-based company TicketMaster, a ticket sales and distribution company, experienced a major breach as they announced on June 27.

Jul 22, 2018
Lesson from TicketMaster Breach: CDN Security of third-party suppliers
blog

Outsmart Your Hackers

lack Kite Cyber Risk Scorecards give you the visibility to outsmart your hackers.

Jul 15, 2018
Outsmart Your Hackers
blog

3.8 Billion Stolen Credentials Are Out There! How About Yours?

According to the 4iQ Identity Breach Report, 8.7 billion raw identity-record data are on the surface, deep, and dark web in 2017.

Jul 8, 2018
3.8 Billion Stolen Credentials are out there! How about yours?
blog

Artificial Intelligence for Cyber Security

Artificial intelligence for cyber security opens up new opportunities to protect organizations.

Jul 3, 2018
Artificial Intelligence for Cyber Security
blog

Have You Patched Your Holes? 6 Simple Things for Patch Management

Patch management is the process of software updates to eliminate vulnerabilities or mitigate cyber risk caused by them.

Jun 29, 2018
Have you patched your holes? 6 Simple Things for Patch Management
blog

What Is Patch Management?

Learn more about what patch management is and how to practice it.

Jun 24, 2018
What is Patch Management?
blog

2018 Guide to Select 3rd Party Cyber-risk Assessment Tool

Survey conducted by Ponemon reveals that 56% of companies have experienced a 3rd-party breach in 2017, an increase of 7% compared to prior year.

Jun 18, 2018
2018 Guide to Select 3rd Party Cyber-Risk Assessment Tool
blog

Are You Ready for Hackers Incoming Supply-chain Attacks?

A recent report released by 401TRG reveals that Chinese hackers are now getting prepared for software supply-chain attacks.

Jun 5, 2018
Are You Ready for Hackers Incoming Supply-Chain Attacks?
blog

Supply Chain Cyber Risk Are Finally Part of the Nist Cybersecurity Framework!

Learn your cyber risk score, create your ecosystem, and discover your supply-chain risk before it is too late.

Jun 4, 2018
Supply Chain Cyber Risk are Finally Part of the NIST Cybersecurity Framework!
blog

Add Your Iot Devices to Your Third-party Cyber Risk Assessments

Internet of Things is a new concept surrounding us every day. But security of IoT devices is defined by S in the abbreviation of the term.

May 24, 2018
Add Your IoT Devices to your Third-Party Cyber Risk Assessments

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.