New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Free TPRM Resources

Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.

Keyword Search
Filter

RESOURCE TYPE

blog

Focus Friday: Third-party Risks in Draytek Vigor Routers, Vmware Esxi, Apache Tomcat, and Axios Http Client Vulnerabilities

Explore key vulnerabilities in DrayTek routers, VMware ESXi, Apache Tomcat, and Axios HTTP Client from a TPRM perspective.

Mar 14, 2025
Focus Friday: Third-Party Risks In DrayTek Vigor Routers, VMware ESXi, Apache Tomcat, and Axios HTTP Client Vulnerabilities
blog

Ransomware Review February 2025: Clop’s Cleo Attack Pushes Victim Count to Historic High

Learn about February’s ransomware activity: a record 809 victims, Clop's CLEO attack peaks, 8Base shutdown, and essential defense insights.

Mar 7, 2025
Ransomware Review February 2025: Clop’s CLEO Attack Pushes Victim Count to Historic High
blog

3rd Party Risk Management

Many organizations have been talking about the 3rd party risk management for years and it is becoming more complex every day.

Mar 6, 2025
3RD PARTY RISK MANAGEMENT
blog

Top 3 Actions to Take After Reading the 2025 Third-party Breach Report

From a CSO to CISOs: How to improve your third-party risk strategy, reduce risk exposure, and apply insights from the 2025 Third-Party Breach Report.

Mar 3, 2025
Top 3 Actions to Take After Reading the 2025 Third-Party Breach Report
blog

Focus Friday: Third-party Risks in Postgresql and Zimbra Vulnerabilities

Explore third-party risk impacts of CVE-2025-1094 in PostgreSQL and CVE-2023-34192 in Zimbra Collaboration Suite (ZCS), plus steps to mitigate them.

Feb 28, 2025
Focus Friday: Third-Party Risks In PostgreSQL and Zimbra Vulnerabilities
blog

Cybersecurity Technology Summit

Cybersecurity Technology Summit; Winners from five Shark Tank Events all come together for the final round of presentations and judging.

Feb 27, 2025
CYBERSECURITY TECHNOLOGY SUMMIT
blog

The Silent Breach: Why Third Parties Are Cybersecurity’s Greatest Hidden Threat

Silent breaches expose hidden vulnerabilities in third-party networks. Learn why they happen, their impact, and how to protect against them in 2025.

Feb 24, 2025
The Silent Breach: Why Third Parties Are Cybersecurity’s Greatest Hidden Threat
blog

Ransomware Review January 2025: Clop’s Cleo Exploit Fuels a Record Month

Get the latest insights from our monthly ransomware roundup: 546 incidents in January 2025, Clop’s CLEO exploit continues, and tips to reduce risk.

Feb 21, 2025
Ransomware Review January 2025: Clop’s CLEO Exploit Fuels a Record Month
blog

Focus Friday: Addressing Third-party Risks in Pan-os, Ivanti Connect Secure, Zimbra, and Cacti Vulnerabilities

Explore third-party risk impacts of PAN-OS, Ivanti, Zimbra, and Cacti vulnerabilities, plus how Black Kite’s FocusTags help mitigate them efficiently.

Feb 14, 2025
Focus Friday: Addressing Third-Party Risks in PAN-OS, Ivanti Connect Secure, Zimbra, and Cacti Vulnerabilities
blog

Key Takeaways From the 2025 Third-party Breach Report

Discover key trends from the 2025 Third-Party Breach Report, including ransomware shifts, regulatory impacts, the rise of continuous risk monitoring.

Feb 13, 2025
Key Takeaways from the 2025 Third-Party Breach Report
report

Black Kite Third-party Breach Report 2025

Discover how third-party breaches became 2024's top cyber threat. Get key insights and strategies from Black Kite’s 2025 Third-Party Breach Report.

Feb 11, 2025
Black Kite Third-Party Breach Report 2025
blog

Black Kite Research Exposes the “silent Breaches” Lurking Within Interconnected Ecosystems

Discover Black Kite’s latest research exposing hidden breaches within interconnected ecosystems and the risks they pose to your supply chain.

Feb 11, 2025
BLACK KITE RESEARCH EXPOSES THE “SILENT BREACHES” LURKING WITHIN INTERCONNECTED ECOSYSTEMS