New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Black Kite Blog

Keyword Search
blog

Black Kite Research Finds Certain Ransomware Groups Disproportionately Target Healthcare Organizations

Black Kite research reveals that certain ransomware groups disproportionately target healthcare, detailing threat trends and risk insights.

Jan 22, 2025
BLACK KITE RESEARCH FINDS CERTAIN RANSOMWARE GROUPS DISPROPORTIONATELY TARGET HEALTHCARE ORGANIZATIONS
blog

Why Healthcare Is Now in the Bullseye for Ransomware Groups

Discover why healthcare is a top ransomware target, key stats from recent attacks, and actionable insights to protect your organization.

Jan 22, 2025
Why Healthcare Is Now in the Bullseye for Ransomware Groups
blog

Focus Friday: Third-party Risks From Critical Juniper Junos, Rsync, and Simplehelp Vulnerabilities

Welcome to this week's Focus Friday blog, where we delve into high-profile cybersecurity incidents with a critical eye on Third-Party Risk Management (TPRM).

Jan 17, 2025
FOCUS FRIDAY: Third-Party Risks From Critical Juniper Junos, Rsync, and SimpleHelp Vulnerabilities
blog

How to Solve Vendor Outreach During Security Crisis Events

Discover how Black Kite Bridge™ revolutionizes the vendor engagement process with risk intelligence, automated tools, and real-time reporting during security cr...

Jan 13, 2025
How to Solve Vendor Outreach During Security Crisis Events
blog

Focus Friday: Addressing Critical Vulnerabilities in Sonicwall, Ivanti, Progress, and Gocd

Welcome to this week's Focus Friday blog, where we delve into high-profile cybersecurity incidents with a critical eye on Third-Party Risk Management (TPRM).

Jan 10, 2025
Focus Friday: Addressing Critical Vulnerabilities in SonicWall, Ivanti, Progress, and GoCD
blog

From Policing to Partnering: Rethinking the Third-party Risk Management Process

Transform your third-party risk management process by shifting from policing to partnering. Strategies to build trust and improve collaboration.

Jan 6, 2025
FROM POLICING TO PARTNERING: RETHINKING THE THIRD-PARTY RISK MANAGEMENT PROCESS
blog

Focus Friday: TPRM Insights on Apache Tomcat, Crushftp, and Gogs Server Vulnerabilities

Welcome to this week's Focus Friday blog, where we delve into high-profile cybersecurity incidents with a critical eye on Third-Party Risk Management (TPRM).

Dec 27, 2024
Focus Friday: TPRM Insights on Apache Tomcat, CrushFTP, and Gogs Server Vulnerabilities
blog

Focus Friday: TPRM Insights on Cleo File Transfer, Beyondtrust Pra and Rs, and Ivanti Cloud Services Application Vulnerabilities

Welcome to this week's Focus Friday blog, where we delve into high-profile cybersecurity incidents with a critical eye on Third-Party Risk Management (TPRM).

Dec 20, 2024
Focus Friday: TPRM Insights On Cleo File Transfer, BeyondTrust PRA and RS, and Ivanti Cloud Services Application Vulnerabilities
blog

Cl0p’s Exploitation of Cleo Puts the Supply Chain at Immediate Risk

Learn how Cl0p's exploitation of Cleo vulnerabilities threatens supply chains and discover critical steps to mitigate ransomware risks.

Dec 18, 2024
Cl0p’s Exploitation of Cleo Puts the Supply Chain at Immediate Risk
blog

Vendor Risk Assessments: Why Scaling Feels Impossible (and What to Do About It)

Vendor risk assessments don’t have to feel impossible to scale with these critical steps and the help of risk tools like Black Kite.

Dec 16, 2024
Vendor Risk Assessments: Why Scaling Feels Impossible (and What To Do About It)
blog

Focus Friday: TPRM Insights on Qlik Sense, Cleo File Transfer, and Sap Netweaver Java Vulnerabilities

Welcome to this week's Focus Friday blog, where we delve into high-profile cybersecurity incidents with a critical eye on Third-Party Risk Management (TPRM).

Dec 13, 2024
Focus Friday: TPRM Insights on Qlik Sense, Cleo File Transfer, And SAP NetWeaver JAVA Vulnerabilities
blog

When Ransomware Ruins the Supply Chain: Lessons From Blue Yonder and the Rise of Termite Ransomware Group

Discover how the Blue Yonder ransomware attack exposed supply chain vulnerabilities and learn strategies to manage third-party risk effectively.

Dec 11, 2024
When Ransomware Ruins the Supply Chain: Lessons from Blue Yonder and the Rise of Termite Ransomware Group

Ready to connect cyber risk intelligence to your entire risk program?

Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.