Free TPRM Resources
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
Your source for primary cybersecurity research from the Black Kite Research Group, thought leadership content on topics that matter today, and more resources to sharpen your TPRM program.
AI enhances Third-Party Risk Management, but it's not the full solution. Discover how to build a robust TPRM program with strong foundations.
Jul 16, 2025How MSSQL, Redis, and Zimbra vulnerabilities impact third-party risk. Black Kite’s FocusTags™ help prioritize exposure and streamline TPRM response.
Jul 11, 2025Explore the Citrix Bleed 2 RCE and Wing FTP Server vulnerabilities from a TPRM perspective—guiding vendor assessments and targeted remediation.
Jul 3, 2025Dig into a critical arbitrary file write vulnerability in Mattermost and two DoS vulnerabilities in MongoDB Server from a TPRM perspective.
Jun 27, 2025What distinguishes quality data in risk management, how to implement data quality control, and why Black Kite provides the most trustworthy data.
Jun 26, 2025How ransomware groups are leveraging AI to carry out attacks today, what to expect next, and how to prepare your cyber ecosystem for these threats.
Jun 25, 2025Unpack the high-severity vulnerability in Grafana and multiple security flaws in Cisco’s ClamAV antivirus engine from a TPRM perspective.
Jun 20, 2025Emerging ransomware groups are using new, evolved tactics, including legitimate software, to bypass defenses. Learn how to protect your organization.
Jun 18, 2025Dive into critical Tridium Niagara and Elastic Kibana vulnerabilities from a TPRM perspective. Learn to assess vendor risk and mitigate proactively.
Jun 13, 2025Traditional TPRM fails against modern threats. New research reveals how to build an agile third-party risk management program for supply chain resilience.
Jun 4, 2025Timely TPRM insights into critical vulnerabilities affecting Zimbra, Draytek Vigor, Atlassian Jira Data Center, Tornado, and MDaemon and next steps
May 23, 2025Learn to operationalize vulnerability intelligence in TPRM. How to prioritize and act on the critical third-party vulnerabilities with insights.
May 22, 2025Integrate risk intelligence into every part of your workflow so you can make more informed decisions with confidence.