Black Kite Blog
3rd Party Vendors of Healthcare Providers Must Meet Hipaa Regulations
The HIPAA aims to protect health-related and personal information of individuals, including medical records, health insurance data, SSNs, etc.
Aug 13, 2018
How Strong Is Your Ssl/tls? 6 Simple Steps to Make It Stronger
Do you want to learn about how strong your SSL/TLS is? Here are the 6 simple steps to make it stronger.
Jul 31, 2018
Lesson From Ticketmaster Breach: Cdn Security of Third-party Suppliers
UK-based company TicketMaster, a ticket sales and distribution company, experienced a major breach as they announced on June 27.
Jul 22, 2018
Outsmart Your Hackers
lack Kite Cyber Risk Scorecards give you the visibility to outsmart your hackers.
Jul 15, 2018
3.8 Billion Stolen Credentials Are Out There! How About Yours?
According to the 4iQ Identity Breach Report, 8.7 billion raw identity-record data are on the surface, deep, and dark web in 2017.
Jul 8, 2018
Artificial Intelligence for Cyber Security
Artificial intelligence for cyber security opens up new opportunities to protect organizations.
Jul 3, 2018
Have You Patched Your Holes? 6 Simple Things for Patch Management
Patch management is the process of software updates to eliminate vulnerabilities or mitigate cyber risk caused by them.
Jun 29, 2018
What Is Patch Management?
Learn more about what patch management is and how to practice it.
Jun 24, 2018
2018 Guide to Select 3rd Party Cyber-risk Assessment Tool
Survey conducted by Ponemon reveals that 56% of companies have experienced a 3rd-party breach in 2017, an increase of 7% compared to prior year.
Jun 18, 2018
Are You Ready for Hackers Incoming Supply-chain Attacks?
A recent report released by 401TRG reveals that Chinese hackers are now getting prepared for software supply-chain attacks.
Jun 5, 2018
Supply Chain Cyber Risk Are Finally Part of the Nist Cybersecurity Framework!
Learn your cyber risk score, create your ecosystem, and discover your supply-chain risk before it is too late.
Jun 4, 2018
Add Your Iot Devices to Your Third-party Cyber Risk Assessments
Internet of Things is a new concept surrounding us every day. But security of IoT devices is defined by S in the abbreviation of the term.
May 24, 2018