New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

The Bedrock of Effective TPRM? Quality Data

What distinguishes quality data in risk management, how to implement data quality control, and why Black Kite provides the most trustworthy data.

Jun 26, 2025
THE BEDROCK OF EFFECTIVE TPRM? QUALITY DATA
blog

AI in Ransomware: How Threat Actors Are (and Aren’t) Using AI

How ransomware groups are leveraging AI to carry out attacks today, what to expect next, and how to prepare your cyber ecosystem for these threats.

Jun 25, 2025
AI IN RANSOMWARE: HOW THREAT ACTORS ARE (AND AREN’T) USING AI
blog

Focus Friday: Grafana Vulnerability and Cisco Clamav Risks From a TPRM Perspective

Unpack the high-severity vulnerability in Grafana and multiple security flaws in Cisco’s ClamAV antivirus engine from a TPRM perspective.

Jun 20, 2025
FOCUS FRIDAY: GRAFANA VULNERABILITY AND CISCO CLAMAV RISKS FROM A TPRM PERSPECTIVE
blog

New-generation Ransomware Groups Are a Growing Threat

Emerging ransomware groups are using new, evolved tactics, including legitimate software, to bypass defenses. Learn how to protect your organization.

Jun 18, 2025
NEW-GENERATION RANSOMWARE GROUPS ARE A GROWING THREAT
blog

Focus Friday: TPRM Insights Into Tridium Niagara and Elastic Kibana Vulnerabilities

Dive into critical Tridium Niagara and Elastic Kibana vulnerabilities from a TPRM perspective. Learn to assess vendor risk and mitigate proactively.

Jun 13, 2025
FOCUS FRIDAY: TPRM INSIGHTS INTO TRIDIUM NIAGARA AND ELASTIC KIBANA VULNERABILITIES
blog

Now’s the Time for Agile, Data-driven TPRM (and Our Latest Research Proves It)

Traditional TPRM fails against modern threats. New research reveals how to build an agile third-party risk management program for supply chain resilience.

Jun 4, 2025
Now’s the Time for Agile, Data-Driven TPRM (and Our Latest Research Proves It)
blog

Built with Now: Black Kite Announces Integration with Servicenow to Boost Supply Chain Cyber Resiliency

Discover how Black Kite’s integration with ServiceNow elevates third-party risk management and strengthens supply chain cyber resilience.

Jun 4, 2025
BUILT WITH NOW: BLACK KITE ANNOUNCES INTEGRATION WITH SERVICENOW TO BOOST SUPPLY CHAIN CYBER RESILIENCY
blog

Focus Friday: TPRM Insights Into Zimbra, Draytek Vigor, Atlassian Jira Data Center, Tornado, and Mdaemon Vulnerabilities

Timely TPRM insights into critical vulnerabilities affecting Zimbra, Draytek Vigor, Atlassian Jira Data Center, Tornado, and MDaemon and next steps

May 23, 2025
FOCUS FRIDAY: TPRM INSIGHTS INTO ZIMBRA, DRAYTEK VIGOR, ATLASSIAN JIRA DATA CENTER, TORNADO, AND MDAEMON VULNERABILITIES
blog

How to Implement Vulnerability Management in TPRM

Learn to operationalize vulnerability intelligence in TPRM. How to prioritize and act on the critical third-party vulnerabilities with insights.

May 22, 2025
HOW TO IMPLEMENT VULNERABILITY MANAGEMENT IN TPRM
blog

Black Kite and Cgs Cyberdefense Partner to Deliver Unparalleled Visibility and Actionable Insights to Remediate Third-party Risks

Learn how Black Kite and CGS CyberDefense partner to deliver deeper visibility and actionable insights for third-party risk remediation.

May 20, 2025
BLACK KITE AND CGS CYBERDEFENSE PARTNER TO DELIVER UNPARALLELED VISIBILITY AND ACTIONABLE INSIGHTS TO REMEDIATE THIRD-PARTY RISKS
blog

Focus Friday: TPRM Insights on Ivanti Epmm and Sap Netweaver Vulnerabilities – Ongoing Threat Actor/ransomware Groups Activity

Explore critical vulnerabilities Ivanti EPMM & SAP NetWeaver through a TPRM lens. Learn how to identify and manage vendor risks.

May 16, 2025
FOCUS FRIDAY: TPRM INSIGHTS ON IVANTI EPMM AND SAP NETWEAVER VULNERABILITIES – ONGOING THREAT ACTOR/RANSOMWARE GROUPS ACTIVITY
blog

Why Counting CVEs Misses the Real Third-party Risk

Counting CVEs for vendor risk is misleading. Why relevance, discoverability, and actionability are key to third-party vulnerability management.

May 15, 2025
WHY COUNTING CVES MISSES THE REAL THIRD-PARTY RISK

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.