Black Kite vs. The Competition See the Difference →

Uncover Your Ransomware Susceptibility

Know the Likelihood of a Ransomware Attack to Your Organization With Black Kite’s Ransomware Susceptibility Index®

Free RSI™ Rating

Understand which vendors are most prone to ransomware with a tool that calculates event susceptibility within minutes.

Develop an effective course of action for remediation by cross correlating findings with Black Kite’s Cyber Risk Assessment.

Avoid production, reputation and financial losses by using reliable data to develop more informed policies.

Know the likelihood of a ransomware attack in minutes

New Video

The world’s first and only Ransomware Susceptibility Index® unveils critical indicators with complete transparency.

Watch Now

Black Kite’s RSI™ in Action

Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack.

Data Breach Index (DBI)
Ransomware Susceptibility Index® (RSI™)
0.0
1.0

The Black Kite RSI™ follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations.

manufacturing cover image

Exclusive Industry Insight

10% of global pharmaceutical manufacturers are at a high risk of suffering a ransomware attack.

Download Report

Common Indicators

Ransomware
Open
critical
ports
Phishing
or fraudulent
domains
Vulnerabilities
with remote
code execution
Endpoint
security
Leaked
credentials
Company
size
Email
security
Company
industry

Free RSI™ Rating

Ransomware report: Latest attacks and news

Loading…

RECENT UPDATES

A Jeffrey Wheatman Commentary on Black Kite’s Third Party Breach Report
A Jeffrey Wheatman Commentary on Black Kite’s Third Party Breach Report
Black Kite just released its 4th annual third-party breach report. It is filled with great data and insight. You can …
Read More
Don’t Ignore the Smaller Partners in Your Third-Party Risk Ecosystem
Don’t Ignore the Smaller Partners in Your Third-Party Risk Ecosystem
When CISOs, third-party risk managers, and supply chain leaders look at cyber risk in their ecosystem, the tendency i…
Read More
No More Best Practice
No More Best Practice
Jeffrey Wheatman here. About a decade ago a client told me a story… Mary, who will hopefully forgive me for te…
Read More
Do You Sbom [Software Bill of Materials], Brah?
Do You Sbom [Software Bill of Materials], Brah?
Hi, it’s Jeffrey. I’ve been in IT and Cybersecurity for three decades (dang, I’m getting old) and in my career I have…
Read More
Do Your Executives Really Understand the Risk of Cybersecurity in Your Supply Chain?
Do Your Executives Really Understand the Risk of Cybersecurity in Your Supply Chain?
By Jeffrey Wheatman We know from the avalanche of year-end reports, surveys, and predictions that supply chain ris…
Read More

Ready to get started?