New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Free TPRM Resources

Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.

Keyword Search
Filter

RESOURCE TYPE

blog

Your Company Accounts May Be Breached. Find Out with Free Account Breach Search

Employees may use their same credentials (e-mail/username/password) used in their company accounts to register third-party services.

Sep 10, 2018
Your company accounts may be breached. Find out with Free Account Breach Search
blog

How to Prevent Software Supply-chain Attacks

Do you want to learn about how to prevent software supply chain attacks? Learn your supply-chain risk before it’s too late.

Sep 2, 2018
How to Prevent Software Supply-Chain Attacks
blog

Do You Monitor Your Suppliers? Iso/iec 27001 Regulations Say You Should

Suppliers have become one of the weaker links in the system. thus, they should be constantly monitored as ISO 27001 standard suggests.

Aug 24, 2018
Do You Monitor Your Suppliers? ISO/IEC 27001 Regulations Say You Should
blog

Third-party Risk Management From Cobit’s Perspective

Black Kite Cyber Risk Scorecard check compliance to well-known cyber security frameworks including COBIT framework.

Aug 24, 2018
Third-Party Risk Management from COBIT’s perspective
blog

3rd Party Vendors of Healthcare Providers Must Meet Hipaa Regulations

The HIPAA aims to protect health-related and personal information of individuals, including medical records, health insurance data, SSNs, etc.

Aug 13, 2018
3rd Party Vendors of Healthcare Providers Must Meet HIPAA Regulations
blog

How Strong Is Your Ssl/tls? 6 Simple Steps to Make It Stronger

Do you want to learn about how strong your SSL/TLS is? Here are the 6 simple steps to make it stronger.

Jul 31, 2018
How Strong is Your SSL/TLS? 6 Simple Steps to Make it Stronger
blog

Lesson From Ticketmaster Breach: Cdn Security of Third-party Suppliers

UK-based company TicketMaster, a ticket sales and distribution company, experienced a major breach as they announced on June 27.

Jul 22, 2018
Lesson from TicketMaster Breach: CDN Security of third-party suppliers
blog

Outsmart Your Hackers

lack Kite Cyber Risk Scorecards give you the visibility to outsmart your hackers.

Jul 15, 2018
Outsmart Your Hackers
blog

3.8 Billion Stolen Credentials Are Out There! How About Yours?

According to the 4iQ Identity Breach Report, 8.7 billion raw identity-record data are on the surface, deep, and dark web in 2017.

Jul 8, 2018
3.8 Billion Stolen Credentials are out there! How about yours?
blog

Artificial Intelligence for Cyber Security

Artificial intelligence for cyber security opens up new opportunities to protect organizations.

Jul 3, 2018
Artificial Intelligence for Cyber Security
blog

Have You Patched Your Holes? 6 Simple Things for Patch Management

Patch management is the process of software updates to eliminate vulnerabilities or mitigate cyber risk caused by them.

Jun 29, 2018
Have you patched your holes? 6 Simple Things for Patch Management
blog

What Is Patch Management?

Learn more about what patch management is and how to practice it.

Jun 24, 2018
What is Patch Management?