Free TPRM Resources
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Markel uses Black Kite to manage a portfolio of insureds in a simple, consumable way, to easily manage aggregate exposures across the organization.
Apr 12, 2022Confidentiality, Integrity, and Availability are the key principles of the CIA triad, the basis for maintaining robust information security procedures.
Apr 7, 2022Insurance carriers face elevated cyber risk, with ransomware susceptibility and phishing exposure significantly higher among poorly rated organizations.
Apr 5, 2022Stay up-to-date in the industry by reading our weekly bites of cyber news by Jeffrey Wheatman & Bob Maley.
Apr 1, 2022The LAPSUS$ attack on Okta signals an increase in third and nth party attacks as an avenue to the main target: prominent customers.
Mar 23, 2022New requirements for reporting data breaches and ransomware attacks aim to protect critical infrastructure and national public safety.
Mar 18, 2022Geopolitical tensions are influencing cyber activity as ransomware groups exploit phishing techniques linked to Conti across U.S. organizations.
Mar 17, 2022Built from a hacker's perspective, Black Kite sparks revolution for what third-party cyber risk management means to businesses today and beyond.
Mar 15, 2022Without alignment on standards, Zero Trust architecture has the potential to discourage gradual growth into compliance due to the daunting ask.
Mar 4, 2022Written by Ferhat Dikbiyik Additional Contributor Yavuz Han Edited by Haley Williams In the last 24-36 hours, state-sponsored hacker groups publicly disclosed w...
Feb 26, 2022Will NIST 800-160 SP v1.1 help federal security engineers protect against national cyber attack? Time tells all– but here’s what to know now.
Feb 25, 2022Automated third-party risk management allows for speed, efficiency and accuracy of vendor risk beyond any human capability.
Feb 22, 2022Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.