New: Black Kite Global Adaptive AI Assessment Framework (BK-GA³™), a truly global framework for assessing AI riskGet It Now
BlackKite: Home
Menu

Free TPRM Resources

Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.

Keyword Search
Filter

RESOURCE TYPE

blog

Focus Friday: TPRM Perspectives on Ivanti Connect Secure, Fortiswitch, and Minio Vulnerabilities

Understand the TPRM implications of Ivanti, FortiSwitch, and MinIO vulnerabilities. Get vendor questions and remediation steps. Read our analysis now!

Apr 11, 2025
Focus Friday: TPRM Perspectives On Ivanti Connect Secure, FortiSwitch, and MinIO Vulnerabilities
blog

Why You Want Human Experts Behind Your TPRM Data: Black Kite Research & Intelligence Team (brite)

Human experts unlock the true value of your TPRM data, turning it into actionable intelligence. How expert analysis improves cyber risk management.

Apr 10, 2025
WHY YOU WANT HUMAN EXPERTS BEHIND YOUR TPRM DATA: BLACK KITE RESEARCH & INTELLIGENCE TEAM (BRITE)
blog

Black Kite Honored as Finalist of the 2025 Sc Awards

Black Kite is honored as a finalist in the 2025 SC Awards for risk and policy management, highlighting excellence in cybersecurity solutions.

Apr 9, 2025
Black Kite Honored as Finalist of the 2025 SC Awards
blog

Black Kite Research Reveals Traditional Approaches to Vulnerability Management Fall Short in Third-party Risk Management (TPRM)

New research from Black Kite shows traditional vulnerability management falls short for third-party risk — and what to do next.

Apr 8, 2025
BLACK KITE RESEARCH REVEALS TRADITIONAL APPROACHES TO VULNERABILITY MANAGEMENT FALL SHORT IN THIRD-PARTY RISK MANAGEMENT (TPRM)
report

2025 Supply Chain Vulnerability Report

Learn to analyze vulnerabilities in third parties, understand attacker tactics, and prioritize critical threats for TPRM remediation in this in-depth report.

Apr 4, 2025
2025 Supply Chain Vulnerability Report
report

Large Language Model Use Cases in Cyber Threat Intelligence

Learn how LLMs streamline CTI in TPRM in this detailed report: Automate OSINT data, cut analysis time, enhance supply chain visibility, and prioritize risks.

Apr 3, 2025
Large Language Model Use Cases in Cyber Threat Intelligence
blog

Black Kite Hires Chief Marketing Officer and Vice President of Strategic Partnership & Alliances to Enhance Leadership Team

Black Kite expands leadership with new Chief Marketing Officer and VP of Strategic Partnerships to drive growth and strategic alliances.

Apr 3, 2025
BLACK KITE HIRES CHIEF MARKETING OFFICER AND VICE PRESIDENT OF STRATEGIC PARTNERSHIP & ALLIANCES TO ENHANCE LEADERSHIP TEAM
blog

Infographic: Takeaways From the 8 Most Noteworthy Cyber Incidents of 2024

Discover 2024’s biggest cyber incidents and how they disrupted third-party cyber ecosystems.

Apr 2, 2025
Infographic: Takeaways from the 8 Most Noteworthy Cyber Incidents of 2024
blog

Infographic: Key Stats From the 2025 Third-party Breach Report

Get the essential numbers from the 2025 Third-Party Breach Report. See the biggest trends, attack methods, and impacts in one infographic.

Mar 31, 2025
Infographic: Key Stats from the 2025 Third-Party Breach Report
blog

Focus Friday: TPRM Implications of Kubernetes Ingress Nginx, Synology Dsm, and Synapse Server Vulnerabilities

Explore critical vulnerabilities in Kubernetes, Synology, and Synapse. Learn TPRM implications and how to streamline risk management with vendors.

Mar 28, 2025
Focus Friday: TPRM Implications of Kubernetes Ingress NGINX, Synology DSM, and Synapse Server Vulnerabilities
blog

Oracle Cloud Breach: Claims, Denials, and the Reality of Cloud Security Risks in TPRM

Claims of an Oracle Cloud breach conflict with official denials. Explore the cloud security risks and leaked data with analysis on the TPRM impact.

Mar 27, 2025
Oracle Cloud Breach: Claims, Denials, and the Reality of Cloud Security Risks in TPRM
blog

Focus Friday: Fortifying TPRM Against Kernel Compromise, Buffer Overflow, and Directory Traversal Vulnerabilities

Strengthen TPRM against kernel, buffer overflow, and directory traversal vulnerabilities in Juniper, MongoDB, and SAP with targeted insights.

Mar 21, 2025
Focus Friday: Fortifying TPRM Against Kernel Compromise, Buffer Overflow, and Directory Traversal Vulnerabilities