Free TPRM Resources
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Encoded Therapeutics implements Black Kite to scale supply chain risk and protect patient information.
Feb 14, 2022Software publishers are targeted more than any other vendor, but this does not mean the remainder of your digital supply chain is secure. See why.
Feb 8, 2022Ciox Health discloses 2021 data breach to customers six months later in a world where healthcare remains the number one target of attack. Learn why.
Feb 4, 2022Do you want to know about Cybersecurity Maturity Model Certification? We answered your questions about CMMC.
Feb 3, 202214 members of notorious RaaS gang REvil, responsible for the Kaseya attack in 2021, arrested in Russia as governments work to slow the ransomware spike.
Jan 25, 2022Ransomware accounted for 27% of third-party breaches in 2022, with software publishers driving most incidents and disclosure delays averaging 75 days.
Jan 20, 2022Address gaps and security issues in your vendor risk management by diving into the details, despite maintaining a good cyber rating at first glance.
Jan 20, 2022Managing reputational risk goes hand-in-hand with monitoring third party risk and maintaining strong cyber posture within the threat landscape.
Jan 13, 2022Look back on cybersecurity learnings from 2021 and into the future of 2022, with predictions and statistics on ransomware and vendor risk management.
Jan 4, 2022Awareness of PCI-compliance both internally and throughout your cyber ecosystem is crucial to ensuring the security of sensitive cardholder data.
Dec 28, 2021Assess vendor risk caused by the Log4j vulnerability with financial impact predictions, status tags, and ways to monitor your cyber ecosystem.
Dec 23, 2021Assess vendor risk caused by the Log4j vulnerability with financial impact predictions, status tags, and ways to monitor your cyber ecosystem.
Dec 14, 2021Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.