Free TPRM Resources
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Learn how to approach third party cyber risk management the right way while controlling costs and improving visibility across vendor ecosystems.
Aug 8, 2023Learn all about different types of hackers populating the threat landscape, their unique methodologies, and what motivates them to take action.
Aug 3, 2023Understand cyber risk intelligence, how to build a proper cyber risk intelligence practice, and what it can actually do for your business.
Jul 31, 2023The SEC finalized new cybersecurity rules, requiring companies to report breaches within a matter of days. Discover what it all means here.
Jul 27, 2023Citrix announces that two NetScaler products, ADC and Gateway, are affected by a zero-day RCE vulnerability. Learn how to mitigate this in your supply chain.
Jul 20, 2023As AI tools grow in popularity, it’s important to consider how threat actors use AI to launch cyber attacks.
Jul 18, 2023Machine learning is revolutionizing industries like cybersecurity. Learn more about the technology and how Black Kite uses ML to detect third-party risk.
Jul 13, 2023Uncover the real story behind security ratings, why they matter, and how your organization can take actionable steps toward improving them.
Jul 10, 2023How to leverage Black Kite when working to meet OSFI's TPRM guidelines.
Jun 27, 2023Black Kite's document parser and natural language processing model now has been refined and tuned for the cybersecurity domain, asUniQuE Parser 2.0.
Jun 22, 2023Small businesses face a unique set of challenges regarding TPRM. Why it’s essential for them to implement a strong third-party vendor management process.
Jun 20, 2023Social engineering is a type of cyber risk that predates computers. Learn more about this type of risk and how to protect your organization.
Jun 15, 2023Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.