Black Kite vs. The Competition See the Difference →

Uncover Your Ransomware Susceptibility

Know the Likelihood of a Ransomware Attack to Your Organization With Black Kite’s Ransomware Susceptibility Index®

Free RSI™ Rating

Understand which vendors are most prone to ransomware with a tool that calculates event susceptibility within minutes.

Develop an effective course of action for remediation by cross correlating findings with Black Kite’s Cyber Risk Assessment.

Avoid production, reputation and financial losses by using reliable data to develop more informed policies.

Know the likelihood of a ransomware attack in minutes

New Video

The world’s first and only Ransomware Susceptibility Index® unveils critical indicators with complete transparency.

Watch Now

Black Kite’s RSI™ in Action

Using data and machine learning, Black Kite’s RSI™ discovers the likelihood that an organization will experience a ransomware attack.

Data Breach Index (DBI)
Ransomware Susceptibility Index® (RSI™)
0.0
1.0

The Black Kite RSI™ follows a process of inspecting, transforming, and modeling collected from a variety of OSINT sources (internet wide scanners, hacker forums, the deep/dark web and more). Using the data and machine learning, the correlation between control items is identified to provide approximations.

Ransomware threat landscape report cover

Exclusive Industry Insight About Ransomware Risk

In our first annual Ransomware Threat Landscape Report, Black Kite Research conducted an analysis and gathering of ransomware attacks over the last year.

Download Report

Ransomware Common Indicators

Ransomware
Open
critical
ports
Phishing
or fraudulent
domains
Vulnerabilities
with remote
code execution
Endpoint
security
Leaked
credentials
Company
size
Email
security
Company
industry

Free RSI™ Rating

Ransomware report: Latest attacks and news

Loading…

RECENT UPDATES

Black Kite Review: RSAC 2023
Black Kite Review: RSAC 2023
RSAC 2023 showcased leading innovations in cybersecurity solutions, talks, and discussions. The conference’s annual t…
Read More
How to Respond a Data Breach in Your Supply Chain
How to Respond a Data Breach in Your Supply Chain
By Jeffrey Wheatman Cybersecurity breaches in the supply chain are a major problem to any organization’s risk post…
Read More
The History of Ransomware: Where It’s Been and Where It’s Going
The History of Ransomware: Where It’s Been and Where It’s Going
Ransomware is nothing new. In fact, it’s been around since 1989. Our 2023 Third Party Breach Report found that ransom…
Read More
Should I Talk to My Vendors About Their Cyber Posture?
Should I Talk to My Vendors About Their Cyber Posture?
You log into your third-party risk platform or questionnaire database and see that one of your biggest vendors has dr…
Read More
Why Your Entire Company Should Help Build Your Third-Party Risk Management Program
Why Your Entire Company Should Help Build Your Third-Party Risk Management Program
Third-party vendor breaches happen constantly. The numbers say it all — 98% of organizations conduct business with a …
Read More

Ready to get started?