<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-the-march-supply-chain-surge-f5-big-ip-truechaos-cisco-imc-perl-grafana-n8n-squid-proxy-and-harbor</loc><lastmod>2026-04-03T13:32:44.528Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-end-of-cyber-risk-ratings-why-tpcrm-is-the-future-of-third-party-risk-</loc><lastmod>2026-04-03T13:52:27.901Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-vulnerabilities-in-mariadb-jenkins-roundcube-zimbra-langflow-and-jspdf</loc><lastmod>2026-03-27T13:17:30.179Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/paul-paget-named-mtlc-ceo-of-the-year</loc><lastmod>2026-03-20T19:41:42.248Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-cisos-master-guide-to-risk-quantification-lessons-from-the-originator-of-fair</loc><lastmod>2026-03-18T17:20:09.498Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-vulnerabilities-in-wing-ftp-screenconnect-litespeed-authlib-and-file-browser</loc><lastmod>2026-03-25T12:24:26.915Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-strategies-for-iran-linked-surveillance-threats-critical-open-source-flaws-and-enterprise-data-leaks</loc><lastmod>2026-03-13T07:51:38.485Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/shinyhunters-and-the-salesforce-experience-cloud-campaign-how-misconfigured-portals-create-supply-chain-risk</loc><lastmod>2026-03-13T20:58:12.732Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-named-a-forbes-best-startup-employer</loc><lastmod>2026-03-10T18:36:25.082Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-vulnerabilities-in-freescout-pac4j-mongodb-django-langflow-rustfs-and-apache-superset</loc><lastmod>2026-03-06T14:11:54.737Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-vulnerabilities-in-solarwinds-serv-u-jenkins-cisco-catalyst-sd-wan-and-n8n</loc><lastmod>2026-03-18T11:47:50.720Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/enabling-secure-connectivity-for-customer-driven-agentic-tpcrm</loc><lastmod>2026-02-24T13:54:34.737Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-vulnerabilities-in-beyondtrust-zimbra-and-postgresql</loc><lastmod>2026-02-20T14:23:13.965Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-microsoft-exchange-sap-netweaver-and-gogs-critical-vulnerabilities</loc><lastmod>2026-02-13T14:03:39.087Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-openclaw-ivanti-epmm-cisco-telepresence-django-and-n8n-exposures</loc><lastmod>2026-02-06T19:41:45.178Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-for-tprm-humans-objective-data-for-smarter-renewal-and-termination-decisions</loc><lastmod>2026-03-27T21:30:57.681Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-fortinet-gnu-inetutils-solarwinds-whd-openssl-smartermail-n8n-react-server-components-and-tp-link-archer-mr600</loc><lastmod>2026-02-05T16:49:17.420Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-sitecore-mssql-sharepoint-cisco-ucm-sap-netweaver-apache-solr-and-appsmith</loc><lastmod>2026-02-05T16:28:00.382Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-for-tprm-humans-filter-noise-surface-risk-continuous-monitoring</loc><lastmod>2026-03-27T21:29:09.247Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-escalating-n8n-risks-and-emerging-infrastructure-vulnerabilities-ni8mare-d-link-dsl-routers-aiohttp-smartermail-coolify</loc><lastmod>2026-01-09T14:34:18.650Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-for-tprm-humans-how-to-accelerate-vendor-vetting-without-questionnaires-</loc><lastmod>2026-03-18T20:20:39.722Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-sonicwall-sma1000-fortigate-ssl-vpn-n8n-exim-mail-zimbra-mongodb-m-files-elastic-kibana-and-freebsd-vulnerabilities</loc><lastmod>2025-12-26T13:03:57.972Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-react2shell-urgent-exploitation-update-and-critical-risks-in-screenconnect-centrestack--triofox-jenkins-freepbx-and-gogs</loc><lastmod>2026-01-23T21:45:33.657Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-fortinet-sso-bypass-exchange-server-flaws-and-cacti-rce-risks</loc><lastmod>2025-12-12T16:50:41.903Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-hidden-costs-of-ai-adoption-in-tprm</loc><lastmod>2025-12-12T16:51:29.523Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-fatigue-is-leaving-the-back-door-open</loc><lastmod>2026-01-27T19:03:50.175Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-react2shell-and-mixpanel-data-exposure-risks</loc><lastmod>2025-12-05T11:03:20.583Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-sonicwall-ssl-vpn-grafana-enterprise-scim-apache-skywalking-vulnerabilities-and-gainsight-client-incident</loc><lastmod>2026-01-27T18:18:12.518Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/rethink-whats-possible-in-tprm-ai-moving-from-automation-to-agents</loc><lastmod>2026-01-27T19:07:45.123Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-fortiweb-solarwinds-serv-u-oauth2-proxy-pgadmin-and-w3-total-cache-vulnerabilities</loc><lastmod>2026-01-27T18:17:29.059Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-is-easy-and-thats-the-problem</loc><lastmod>2026-01-27T19:04:14.334Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/whats-next-in-ransomware-how-threat-actors-will-weaponize-ai</loc><lastmod>2026-01-27T19:42:27.851Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/is-your-vendors-ai-putting-you-at-risk</loc><lastmod>2026-01-27T18:47:52.640Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-sharepoint-mssql-kibana-django-and-open-webui</loc><lastmod>2026-01-27T18:29:30.208Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-ransomware-groups-are-zeroing-in-on-smbs</loc><lastmod>2026-01-27T19:46:38.027Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-moveit-redis-control-web-panel-dnn-software-and-xwiki-vulnerabilities</loc><lastmod>2026-01-27T18:25:32.957Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-fatigue-is-leaving-the-back-door-open</loc><lastmod>2025-11-06T15:53:47.331Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-critical-third-party-risks-in-mikrotik-routeros-apache-tomcat-hashicorp-vault-and-litespeed-plugin</loc><lastmod>2026-01-27T17:51:37.886Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/nows-the-time-for-agile-data-driven-tprm-and-our-latest-research-proves-it</loc><lastmod>2026-01-27T18:59:40.359Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/resource-roundup-stop-drowning-in-cves-prioritize-your-supply-chain-vulnerabilities</loc><lastmod>2026-01-27T19:07:23.913Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/top-cyber-concerns-and-resilience-strategies</loc><lastmod>2026-01-27T19:26:56.161Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/software-updates-are-not-optional</loc><lastmod>2025-11-01T16:46:30.289Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/should-operational-security-be-discussed-with-the-board</loc><lastmod>2025-11-01T16:43:51.449Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-prioritize-security-when-executives-are-focused-on-business-growth</loc><lastmod>2025-11-19T19:59:17.247Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-the-difference-between-vrm-tprm-and-supply-chain-risk-management</loc><lastmod>2025-11-01T16:32:47.000Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ciso-on-the-road-with-bob-maley</loc><lastmod>2025-11-01T16:28:54.508Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/time-to-revamp-your-typical-password-strategy</loc><lastmod>2026-01-27T19:25:50.576Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/phishing-history-statistics-and-prevention</loc><lastmod>2025-11-20T16:27:13.530Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/dont-let-chaos-bring-you-down</loc><lastmod>2025-11-01T16:15:13.719Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-tools-cyber-attacks</loc><lastmod>2025-11-01T16:11:19.365Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/different-types-of-hackers</loc><lastmod>2025-11-19T15:04:33.153Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/osfi-tprm-guideline</loc><lastmod>2025-11-20T16:23:18.824Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/machine-learning-third-party-risk</loc><lastmod>2025-11-01T15:27:01.794Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/social-engineering-cybersecurity</loc><lastmod>2025-11-01T15:23:25.718Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/four-cybersecurity-tips-for-navigating-to-a-hybrid-work-environment</loc><lastmod>2026-01-27T18:32:02.842Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/top-five-third-party-breaches-in-april-2021-hackers-bite-from-apple-airlines-hit-turbulence-and-more</loc><lastmod>2025-11-20T19:15:05.335Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-protected-are-you-against-ransomware</loc><lastmod>2025-11-01T15:08:05.150Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-risk-ratings-leader-normshield-rebrands-to-black-kite</loc><lastmod>2025-11-01T15:01:08.787Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-reputational-risk-matters-regardless-of-company-size</loc><lastmod>2026-01-27T19:46:54.870Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/five-reasons-why-supply-chains-need-security-monitoring</loc><lastmod>2026-01-27T17:50:19.103Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/are-security-rating-services-really-worth-it-for-smbs</loc><lastmod>2026-01-27T17:33:46.800Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/artificial-intelligence-cyber-risk</loc><lastmod>2026-01-27T17:34:27.716Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/final-rule-sec-to-require-companies-to-report-breaches-in-4-days</loc><lastmod>2025-11-01T14:34:50.504Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/small-business-third-party-vendors-risks</loc><lastmod>2025-11-01T14:32:24.210Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/rsac-2023-in-review</loc><lastmod>2025-11-01T14:27:45.914Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/its-time-to-make-multi-factor-authentication-mfa-part-of-your-daily-routine</loc><lastmod>2025-11-19T21:18:55.779Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/i-like-cheese-please-stop-talking-about-cost-cutting-instead-focus-on-cost-optimization</loc><lastmod>2025-10-31T22:58:14.035Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cybersecurity-rating-vs-penetration-testing-pen-test</loc><lastmod>2025-10-31T22:45:50.070Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/do-grc-requirements-truly-reduce-risk</loc><lastmod>2025-10-31T22:40:44.847Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-conduct-cost-optimization-and-remain-cyber-safe-during-an-economic-downturn</loc><lastmod>2025-10-31T22:34:59.246Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-should-cyber-securitys-role-in-sourcing-and-procurement-be</loc><lastmod>2026-01-27T19:41:04.740Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-unveils-industrys-first-monthly-ransomware-dashboards</loc><lastmod>2026-01-27T17:37:26.027Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-history-of-ransomware-where-its-been-and-where-its-going</loc><lastmod>2026-01-27T19:15:06.890Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-trends-2023-the-who-what-and-why</loc><lastmod>2026-01-27T19:06:45.013Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-gartner-peer-insights-customers-choice-north-america-segment</loc><lastmod>2025-10-31T22:06:11.090Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/security-luminaries-join-black-kites-board-of-advisors</loc><lastmod>2025-10-31T22:03:02.224Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/if-we-stop-worrying-about-who-gets-credit-and-focus-on-the-outcome-change-is-much-easier-to-enable</loc><lastmod>2025-10-31T21:59:42.496Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-you-need-to-know-about-maturing-your-third-party-risk-management-program</loc><lastmod>2026-01-27T19:42:07.085Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/t-mobile-hacked-6-times-in-last-4-years</loc><lastmod>2025-10-31T21:48:23.635Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/healthcare-ransomware-attack-led-to-cancelled-surgeries-and-diverted-patients--what-is-next</loc><lastmod>2026-01-27T18:35:39.323Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-top-five-third-party-data-breaches-in-june-2021-revealed</loc><lastmod>2025-11-20T18:11:29.080Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/tired-of-guessing-whether-your-ip-addresses-are-blacklisted</loc><lastmod>2026-02-18T19:19:07.101Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/four-ways-automation-can-transform-your-third-party-cyber-risk-management-strategy</loc><lastmod>2026-01-27T18:32:37.631Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/understand-supply-chain-risk-susceptibility-to-prevent-new-microsoft-exchange-server-ransomware-attacks</loc><lastmod>2025-10-31T21:10:22.655Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/simplifying-vendor-security-assessments-part-ii-questions-to-ask-along-the-road</loc><lastmod>2026-01-27T19:09:10.248Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/inside-the-mind-of-a-cybercriminal-common-hacking-methods-explainedmethods-explained</loc><lastmod>2025-11-21T19:14:11.270Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/over-40-million-consumers-affected-by-the-top-third-party-data-breaches-in-august-2021</loc><lastmod>2025-10-31T20:52:22.173Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/simplifying-vendor-risk-assessments-part-i-designing-your-vra-roadmap</loc><lastmod>2026-01-27T19:08:50.779Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-secret-to-ransomware-risk-management-in-2021</loc><lastmod>2026-01-27T19:17:25.120Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-attacks-against-the-fortune-500-lessons-learned-from-accenture</loc><lastmod>2025-11-20T16:29:04.722Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-data-breaches-in-july-2021-revealed-ransomware-continues-its-reign</loc><lastmod>2026-01-27T19:22:08.656Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/data-breach-access-points-hide-in-the-digital-supply-chain</loc><lastmod>2025-10-31T19:08:42.501Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/are-your-third-parties-pci-compliant</loc><lastmod>2025-10-31T19:03:25.608Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-phishing-tips-to-identify-and-prevent-cyber-scams</loc><lastmod>2025-10-31T18:55:54.402Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-supply-chain-risk-assessments-are-critical-to-cybersecurity</loc><lastmod>2025-11-20T20:38:39.045Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/fbi-issues-ransomware-warning-for-mergers-and-acquisitions</loc><lastmod>2025-10-31T18:43:12.646Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/expert-insights-us-federal-government-risk-in-2022</loc><lastmod>2025-10-31T18:36:23.095Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-risk-management-a-tool-or-a-process</loc><lastmod>2025-10-31T18:31:59.501Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/spotlight-on-the-gramm-leach-bliley-act-glba</loc><lastmod>2025-10-31T18:28:53.014Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/5-ways-automation-is-revolutionizing-third-party-risk-management</loc><lastmod>2025-10-31T18:35:57.592Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/new-federal-cybersecurity-legislation-aimed-at-protecting-critical-infrastructure</loc><lastmod>2025-10-31T18:21:13.862Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/weekly-bites-2022</loc><lastmod>2025-10-31T18:15:37.858Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-recession-is-coming-are-cuts-in-cybersecurity-inevitable</loc><lastmod>2025-10-31T18:08:46.964Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/do-you-sbom</loc><lastmod>2025-10-31T18:06:18.919Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/risk-and-reels-goes-live-hear-from-jeffrey-wheatman-on-starting-a-podcast</loc><lastmod>2025-10-31T17:54:49.110Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/strong-cybersecurity-talent-the-biggest-need-for-companies-in-2022</loc><lastmod>2025-10-31T17:44:28.532Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/defend-cybersecurity-investment-amidst-an-economic-downturn</loc><lastmod>2025-10-31T17:13:20.734Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/2022-key-third-party-breaches-healthcare-still-at-major-risk</loc><lastmod>2025-10-31T16:42:00.233Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/controls-without-enforcement-is-zero-trust-possible</loc><lastmod>2025-10-31T16:27:11.913Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-cia-triad-a-key-part-of-your-cyber-security-program</loc><lastmod>2025-10-31T16:22:59.987Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cmmc-in-six-questions-what-to-know-about-the-cybersecurity-maturity-model-certification</loc><lastmod>2025-11-19T19:24:05.793Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/prioritizing-third-party-risk-intelligence-in-a-managed-services-package</loc><lastmod>2025-10-31T15:58:44.603Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-human-firewall-why-employees-play-a-critical-role-in-cyber-risk-management</loc><lastmod>2026-01-27T19:15:34.282Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ciox-health-breach-impacts-30-institutions-why-does-healthcare-continue-to-be-targeted-in-2022</loc><lastmod>2025-10-31T15:40:44.297Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/reputational-cyber-risk-how-to-avoid-business-lost</loc><lastmod>2026-01-27T19:07:04.291Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-patch-management-and-how-does-it-impact-cyber-risk-management</loc><lastmod>2026-01-27T19:38:43.720Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/new-years-resolutions-for-2022-cyber-risk-learnings</loc><lastmod>2025-11-20T16:15:39.367Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/understanding-the-nist-800-160-sp-11-draft</loc><lastmod>2025-11-20T19:19:47.013Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/devil-in-the-details-how-to-address-third-party-risks</loc><lastmod>2026-01-27T17:44:33.505Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/financial-institution-risk-exposure</loc><lastmod>2026-01-27T17:49:57.465Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/hecvat-compliance-automation</loc><lastmod>2026-01-27T18:36:41.855Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/who-owns-cybersecurity-in-supply-chain-risk-management</loc><lastmod>2026-01-27T19:43:25.953Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-in-qlik-sense-adobe-coldfusion-and-atlassian-confluence-vulnerabilities</loc><lastmod>2025-10-31T14:47:30.619Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-critical-cve-2023-7102-vulnerability-in-barracuda-esg</loc><lastmod>2025-10-31T14:26:40.992Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/transmit-security-cio-david-mahdi-talks-cybersecurity-standards</loc><lastmod>2025-10-31T12:53:23.039Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-okta-owncloud-openvpn-and-citrix-incidents-with-black-kites-focus-tags</loc><lastmod>2025-10-30T21:57:54.590Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-cyber-risk-intelligence-solution-of-choice</loc><lastmod>2025-11-02T15:06:08.936Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/top-ten-threat-actor-trends-2023</loc><lastmod>2025-11-02T15:06:50.748Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-added-to-the-department-of-homeland-securitys-continuous-diagnostics-and-mitigation-programs-approved-products-list-cdm-apl</loc><lastmod>2025-10-30T21:40:51.206Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/httpsfocus-friday-tackling-emerging-threats-volt-typhoon-elementor-rce-and-mlflow-vulnerabilities</loc><lastmod>2025-11-20T21:52:51.040Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/mitigating-cisco-ios-xe-web-ui-vulnerability-cve-2023-20198</loc><lastmod>2025-11-20T16:09:56.610Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/due-diligence-checklist-in-5-steps</loc><lastmod>2026-01-27T17:46:21.631Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-jeffrey-wheatman-commentary-on-black-kites-third-party-breach-report</loc><lastmod>2026-01-27T17:29:21.871Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/dont-ignore-the-smaller-partners-in-your-third-party-risk-ecosystem</loc><lastmod>2026-01-27T17:45:16.671Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/no-more-best-practice</loc><lastmod>2026-01-27T18:59:03.518Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-a-brute-force-attack-and-how-can-you-prevent-it</loc><lastmod>2026-01-27T19:34:32.968Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/fair-scenarios-ransomware-business-interruptions</loc><lastmod>2026-01-27T17:46:38.527Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-ivanti-epmm-goanywhere-and-vmware-vulnerabilities</loc><lastmod>2025-10-30T20:42:27.087Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-a-tprm-deep-dive-into-outlook-rce-and-forticlient-ems-vulnerabilities</loc><lastmod>2025-10-30T20:34:51.394Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/downfall-of-a-digital-titan-the-global-sting-that-toppled-lockbit</loc><lastmod>2026-01-27T17:46:04.383Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-january-2021</loc><lastmod>2025-10-30T20:20:50.992Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-lockbit-shutdown-insights--screenconnect-and-exchange-server-vulnerabilities</loc><lastmod>2025-11-04T14:51:36.568Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/is-alphvblackcat-staging-its-own-death-for-a-rich-exit</loc><lastmod>2026-01-27T18:47:32.477Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kites-fifth-annual-third-party-breach-report-highlights-ripple-effects-of-cyber-ecosystem-breaches</loc><lastmod>2025-10-30T19:51:00.187Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-adobe-coldfusion-joomla-apache-superset-and-nextcloud-vulnerabilities</loc><lastmod>2025-10-30T19:47:36.794Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/nist-csf-20-in-10-questions</loc><lastmod>2025-10-30T19:39:09.752Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-enhancing-tprm-vigilance-against-critical-vulnerabilities-in-fortios-symantec-roundcube-and-qnap-systems</loc><lastmod>2025-10-30T19:30:54.167Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/build-third-party-risk-management-program</loc><lastmod>2026-01-27T17:39:25.335Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/missed-signals-how-the-ransomware-attack-on-apples-supplier-could-have-been-detected-sooner</loc><lastmod>2026-01-27T18:57:33.997Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-in-march-2021-airlines-healthcare--more-take-a-hit</loc><lastmod>2025-11-20T15:39:06.991Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/three-assumptions-you-should-never-make-about-ransomware</loc><lastmod>2026-01-27T19:23:02.811Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/dos--donts-for-revamping-your-cybersecurity-playbook</loc><lastmod>2025-10-30T18:39:52.453Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-cybersecurity-is-a-business-issue-not-just-an-it-issue</loc><lastmod>2026-01-27T19:45:00.385Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-day-strikes-again-what-kaseya-should-teach-us</loc><lastmod>2026-01-27T19:03:24.400Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-whac-a-mole-game-between-cybercriminals-and-security-teams</loc><lastmod>2026-01-27T19:19:40.928Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/seven-sins-in-enterprise-cybersecurity-that-will-cost-you-more-in-the-long-run</loc><lastmod>2026-01-27T19:08:20.660Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-create-an-effective-cyber-incident-response-plan</loc><lastmod>2026-01-27T18:40:20.577Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-most-common-cybersecurity-threats-facing-supply-chains-in-2021</loc><lastmod>2025-11-04T14:52:30.749Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-preview-of-the-2021-manufacturing-risk-pulse-consumer-packaged-goods</loc><lastmod>2025-10-30T16:42:02.708Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/solarwinds-breach-gray-rhino-or-black-swan</loc><lastmod>2026-01-27T19:09:31.322Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/making-the-case-for-automation-vendor-questionnaires-compliance-mapping</loc><lastmod>2026-01-27T18:54:49.732Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/3-critical-actions-to-strengthen-third-party-risk-management</loc><lastmod>2026-01-27T17:25:56.345Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/qualys-and-accellion-the-third-party-breach-ripple-effect</loc><lastmod>2026-01-27T19:03:06.241Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-december-2020</loc><lastmod>2025-10-29T16:31:33.531Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/five-lessons-learned-from-the-largest-third-party-breaches-in-2020</loc><lastmod>2025-10-29T16:04:46.996Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/accellion-another-data-breach-defined</loc><lastmod>2026-01-27T17:30:41.853Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-february-2021</loc><lastmod>2025-10-29T15:24:07.209Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-partners-with-templar-shield-to-expand-availability-of-third-party-risk-management-and-cyber-risk-ratings-services_blog</loc><lastmod>2025-10-28T16:28:51.879Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/behind-the-screen-meet-5-of-the-most-notorious-ransomware-groups</loc><lastmod>2026-01-27T17:35:11.309Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-cyber-resilience</loc><lastmod>2026-01-27T19:37:28.374Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/three-common-ways-bad-actors-target-digital-supply-chain</loc><lastmod>2026-01-27T19:25:11.068Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-risk-assessment</loc><lastmod>2026-01-27T19:22:45.355Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-cyber-risk</loc><lastmod>2026-01-27T19:20:40.246Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-context-matters-in-security-metrics</loc><lastmod>2026-01-27T19:44:16.387Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/best-practices-residual-risk</loc><lastmod>2026-01-27T17:36:01.282Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-more-than-ransom</loc><lastmod>2026-01-27T19:05:29.133Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-simple-approach-to-prioritizing-cyber-risk-in-your-third-party-relationships</loc><lastmod>2026-01-27T17:30:02.787Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-cyber-risk-a-guide-to-your-first-steps-in-managing-it</loc><lastmod>2026-02-24T19:30:12.317Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-enhancing-tprm-through-insight-on-the-critical-xz-utils-vulnerability</loc><lastmod>2025-10-27T21:50:29.620Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-mirth-connect-and-veeam-backup-enterprise-manager-vulnerabilities-a-tprmapproach</loc><lastmod>2025-10-27T21:45:00.474Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-veeam-spc-and-cacti-vulnerabilities-a-tprm-approach</loc><lastmod>2025-10-27T21:26:02.943Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/managing-risk-in-a-supply-chain</loc><lastmod>2026-01-27T18:55:29.980Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-may-2020</loc><lastmod>2025-10-27T21:05:26.254Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/twitter-cyber-attack-2</loc><lastmod>2025-10-27T20:57:37.553Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-a-ticketing-system-is-critical-to-third-party-risk-management</loc><lastmod>2025-10-27T20:44:14.539Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-july-2020</loc><lastmod>2026-01-27T18:50:55.522Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-cyber-security-posture-of-vpn-vendors</loc><lastmod>2026-01-27T19:14:45.484Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-you-need-to-know-today-about-the-cyber-posture-of-remote-collaboration-tools</loc><lastmod>2025-10-27T20:25:48.050Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cybercriminals-prey-on-healthcare-workers</loc><lastmod>2026-01-27T17:43:13.140Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-security-concerns-as-the-world-begins-to-re-open</loc><lastmod>2025-10-27T19:26:39.072Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-patch-management-matters</loc><lastmod>2026-01-27T19:46:14.621Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-guide-to-fix-your-cyber-rating-heres-the-black-kite-strategy-report</loc><lastmod>2026-01-27T17:28:58.053Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-june-2020</loc><lastmod>2025-11-18T21:57:32.358Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/10-questions-to-ask-when-securing-your-supply-chain</loc><lastmod>2025-11-19T18:51:44.678Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-cyber-risk-with-ai</loc><lastmod>2026-02-18T21:13:03.870Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-secures-7-5-million-in-series-a-funding</loc><lastmod>2025-10-27T17:31:41.550Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-tale-of-two-threats</loc><lastmod>2025-11-19T19:11:02.064Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-bother-with-third-party-cyber-risk-management-at-all</loc><lastmod>2026-01-27T19:43:50.174Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/sim-connect-annual-conference</loc><lastmod>2025-10-26T20:37:12.726Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-security-services-do-companies-really-need-them</loc><lastmod>2025-10-26T20:34:59.838Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/which-one-is-more-secure-banks-or-cryptocurrency-exchange-markets</loc><lastmod>2026-02-18T20:25:30.033Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/2018-guide-to-select-3rd-party-cyber-risk-assessment-tool</loc><lastmod>2026-01-27T17:24:18.037Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/are-you-ready-for-hackers-incoming-supply-chain-attacks</loc><lastmod>2025-10-26T20:13:22.182Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/38-billion-stolen-credentials-are-out-there-how-about-yours</loc><lastmod>2026-02-18T21:16:28.191Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/artificial-intelligence-for-cyber-security</loc><lastmod>2026-01-27T17:34:51.220Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/lesson-from-ticketmaster-breach-cdn-security-of-third-party-suppliers</loc><lastmod>2026-01-27T18:49:43.941Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/3rd-party-vendors-of-healthcare-providers-must-meet-hipaa-regulations</loc><lastmod>2026-01-27T17:27:31.705Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/do-you-monitor-your-suppliers-isoiec-27001-regulations-say-you-should</loc><lastmod>2026-02-23T19:07:15.603Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/your-company-accounts-may-be-breached-find-out-with-free-account-breach-search</loc><lastmod>2025-10-30T14:49:30.503Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-breaches-revealed-in-september-2018</loc><lastmod>2025-10-26T19:25:27.954Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/outsmart-your-hackers</loc><lastmod>2026-01-27T19:02:03.686Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/british-airways-breach-is-it-a-third-party-attack</loc><lastmod>2026-01-27T17:39:05.119Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/open-invitation-to-hackers-misconfigured-cloud-servers</loc><lastmod>2026-01-27T19:00:12.041Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-risk-management-from-cobits-perspective</loc><lastmod>2026-02-18T21:15:01.373Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/reduce-your-cyber-exposure-to-mitigate-your-cyber-risk</loc><lastmod>2025-11-20T16:41:29.552Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-breaches-revealed-in-october-2018</loc><lastmod>2025-10-26T18:49:37.405Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-strong-is-your-ssltls-6-simple-steps-to-make-it-stronger</loc><lastmod>2025-10-26T18:45:11.270Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/check-whether-your-ip-assets-are-blacklisted-or-not</loc><lastmod>2026-02-23T21:17:18.781Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/gdpr-compliance-checker</loc><lastmod>2025-11-02T15:20:31.344Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-prevent-software-supply-chain-attacks</loc><lastmod>2026-01-27T18:42:10.788Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-in-draytek-vigor-routers-vmware-esxi-apache-tomcat-and-axios-http-client-vulnerabilities</loc><lastmod>2026-01-27T18:12:41.777Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-review-december-2024-funksecs-meteoric-rise-and-the-growing-threat-of-raas</loc><lastmod>2026-01-27T19:05:46.491Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-fortifying-tprm-against-kernel-compromise-buffer-overflow-and-directory-traversal-vulnerabilities</loc><lastmod>2026-01-27T17:51:59.076Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-in-postgresql-and-zimbra-vulnerabilities</loc><lastmod>2026-01-27T18:13:07.376Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-fortigate-qnap-mongoose-and-w3-total-cache-vulnerabilities-with-black-kites-focustags</loc><lastmod>2026-01-27T18:23:29.501Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-research-exposes-the-silent-breaches-lurking-within-interconnected-ecosystems</loc><lastmod>2025-10-26T17:20:46.932Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-review-january-2025-clops-cleo-exploit-fuels-a-record-month</loc><lastmod>2026-01-27T19:06:23.388Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-third-party-risks-in-pan-os-ivanti-connect-secure-zimbra-and-cacti-vulnerabilities</loc><lastmod>2026-01-27T17:51:16.009Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/infographic-healthcare-under-siege--the-ransomware-epidemic</loc><lastmod>2026-01-27T18:45:33.153Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-silent-breach-why-third-parties-are-cybersecuritys-greatest-hidden-threat</loc><lastmod>2026-01-27T19:17:47.207Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-implications-of-kubernetes-ingress-nginx-synology-dsm-and-synapse-server-vulnerabilities</loc><lastmod>2026-01-27T18:16:46.918Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/2025-third-party-breach-report-key-takeaways</loc><lastmod>2026-01-27T17:24:59.125Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/oracle-cloud-breach-claims-denials-and-the-reality-of-cloud-security-risks-in-tprm</loc><lastmod>2026-01-27T19:00:34.763Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ransomware-review-february-2025-clops-cleo-attack-pushes-victim-count-to-historic-high</loc><lastmod>2026-01-27T19:06:06.394Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-research-reveals-traditional-approaches-to-vulnerability-management-fall-short-in-third-party-risk-management-tprm</loc><lastmod>2025-11-18T14:57:40.407Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-prioritize-vulnerabilities-in-your-supply-chain</loc><lastmod>2026-01-27T18:42:37.233Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-unveils-vulnerability-intelligence-briefs-to-provide-visibility-into-third-party-vulnerability-risks</loc><lastmod>2026-01-27T17:37:46.352Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-sysaid-activemq-webmin-and-couchbase-server-vulnerabilities</loc><lastmod>2025-10-26T14:36:45.358Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-fortinet-backdoors-sonicwall-sslvpn-and-redis-dos-vulnerabilities</loc><lastmod>2026-01-27T18:17:06.038Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/infographic-key-stats-from-the-2025-third-party-breach-report</loc><lastmod>2026-01-27T18:46:04.171Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/infographic-takeaways-from-the-8-most-noteworthy-cyber-incidents-of-2024</loc><lastmod>2026-01-27T18:46:26.717Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/your-friendly-neighborhood-ransomware-syndicate-will-see-you-now</loc><lastmod>2026-01-27T19:48:52.506Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-perspectives-on-ivanti-connect-secure-fortiswitch-and-minio-vulnerabilities</loc><lastmod>2026-01-27T18:30:17.407Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-from-adobe-coldfusion-and-beego-xss-vulnerabilities</loc><lastmod>2025-10-26T13:36:43.610Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-approach-to-sat-netweaver-vcframework-rce-and-apache-tomcat-http-2-dos-and-rewrite-rule-bypass</loc><lastmod>2026-01-27T18:16:26.163Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ey-us-unveils-paul-paget-of-black-kite-as-an-entrepreneur-of-the-year-2025-new-england-award-finalist</loc><lastmod>2025-10-30T14:23:59.236Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-php-cgi-microsoft-msmq-and-rejetto-hfs-vulnerabilities-a-tprm-approach</loc><lastmod>2025-10-25T22:10:48.175Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-we-learned-at-rsac-2024</loc><lastmod>2025-10-25T21:47:52.514Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-challenges-in-the-face-of-ivanti-ics-cacti-sonicwall-confluence-and-citrix-vulnerabilities</loc><lastmod>2025-10-25T21:43:18.622Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-lessons-from-the-crowdstrike-update-outage-on-global-it-resilience</loc><lastmod>2026-01-27T17:52:20.208Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/crowdstrike-outage-lessons-on-fragility-and-resilience</loc><lastmod>2026-01-27T17:42:18.158Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/new-standards-forrester-wave</loc><lastmod>2025-11-02T15:30:05.145Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-critical-vulnerabilities-in-microsoft-windows-solarwinds-whd-zimbra-and-exchange-server</loc><lastmod>2025-10-25T21:24:22.191Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-dahua-nvr4-jenkins-classloaderproxy-and-zabbix-vulnerabilities-with-black-kites-focustags</loc><lastmod>2025-10-25T21:18:13.866Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-bridge-enables-industry-first-risk-collaboration-across-vendor-ecosystem</loc><lastmod>2025-10-25T21:12:20.560Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-achieves-soc-2--type-2-compliance</loc><lastmod>2025-10-25T21:09:18.982Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-the-pan-os-cleartext-vulnerability--a-sneak-peek-into-whats-next</loc><lastmod>2025-10-25T21:05:25.904Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-gogs-internet-explorer-docker-authz-and-jumpserver-vulnerabilities</loc><lastmod>2025-11-04T17:12:39.431Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/tprm-myth-you-cant-see-nth-party-risks</loc><lastmod>2025-11-02T15:31:58.862Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-vmware-esxi-authentication-bypass-vulnerability</loc><lastmod>2025-10-25T20:39:56.758Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/tprm-myth-you-cant-predict-ransomware</loc><lastmod>2025-11-18T22:40:44.735Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-managing-third-party-risks-from-dahua-ip-camera-sonicwall-firewall-and-wpml-filecatalyst-workflow-vulnerabilities-with-black-kites-focustags</loc><lastmod>2025-10-25T20:27:26.145Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/three-new-solutions-from-black-kite-automate-compliance-of-third-party-cyber-assessments-with-industrys-first-cyber-aware-ai-engine</loc><lastmod>2026-01-27T19:25:31.658Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-risk-in-financial-terms-why-fair-is-the-gold-standard</loc><lastmod>2026-01-27T17:42:55.295Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cybersecurity-ratings</loc><lastmod>2026-01-27T17:43:31.632Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/vendor-cyber-posture-talk</loc><lastmod>2026-01-27T19:33:09.136Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-challenge-of-securing-a-constantly-shifting-tech-ecosystem</loc><lastmod>2026-01-27T19:12:32.777Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-quick-guide-to-cybersecurity-continuous-monitoring-resources</loc><lastmod>2026-01-27T17:29:40.974Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-critical-third-party-risk-insights--mssql-and-adobe-flash-player-vulnerabilities</loc><lastmod>2025-10-25T19:50:37.419Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-insights-into-third-party-risks-in-fortinet-core-products-cisco-rv-routers-and-ivanti-connect-secure-vulnerabilities</loc><lastmod>2025-10-25T19:38:09.614Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-vendor-collaboration-is-critical-in-tprm-and-how-to-do-it-right</loc><lastmod>2026-03-17T19:44:11.194Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-research-reveals-that-80-of-manufacturing-companies-have-critical-vulnerabilities</loc><lastmod>2025-10-25T19:25:20.442Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/osfi-b-10-and-b-13-for-financial-institutions</loc><lastmod>2025-11-04T17:13:09.135Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-announces-court-dismissal-of-bitsight-technologies-patent-claims-in-federal-court-litigation</loc><lastmod>2025-10-25T19:18:49.317Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-pgadmin-keycloak-and-navidrome-vulnerabilities</loc><lastmod>2025-10-25T19:17:23.074Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/your-guide-to-developing-an-ai-driven-tprm-program</loc><lastmod>2025-11-20T20:45:35.714Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-zimbra-draytek-routers-authentik-octopus-deploy-vulnerabilities</loc><lastmod>2025-11-02T15:37:40.793Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/communicating-risk-intelligence-with-stakeholders</loc><lastmod>2026-01-27T17:41:53.107Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-august-2020</loc><lastmod>2025-10-25T18:42:53.205Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/seven-questions-to-ask-when-assessing-security-rating-services</loc><lastmod>2026-01-27T19:08:03.444Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/patched-your-network-recently-the-growing-risk-on-it-vendors</loc><lastmod>2026-01-27T19:02:23.073Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-a-good-vendor-risk-management-program-looks-like-in-2020</loc><lastmod>2025-11-20T19:22:51.117Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-september-2020</loc><lastmod>2025-10-25T17:54:47.485Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-october-2020-part-1</loc><lastmod>2025-10-25T17:51:41.649Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/hipaa-basics-for-third-parties-in-healthcare</loc><lastmod>2026-01-27T18:37:00.153Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-october-2020-part-2</loc><lastmod>2025-11-20T15:49:39.502Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-transparent-grading-matters-in-the-srs</loc><lastmod>2026-01-27T19:47:38.345Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-was-not-surprising-about-the-recent-government-targeted-attacks</loc><lastmod>2026-01-27T19:41:42.705Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-cyber-risk-intelligence</loc><lastmod>2026-01-27T19:38:23.610Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-cyber-risk-management-save-on-costs</loc><lastmod>2026-01-27T19:21:26.904Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/2024-third-party-breach-report-key-takeaways</loc><lastmod>2026-01-27T17:24:39.466Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/decoding-ransomware-insights-from-head-researcher</loc><lastmod>2026-01-27T17:44:14.095Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/are-you-a-prime-ransomware-target-consider-these-risk-factors</loc><lastmod>2026-01-27T17:34:05.270Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/howto-interpret-risk-intelligence-report</loc><lastmod>2026-01-27T18:44:42.846Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/using-third-party-risk-intelligence-in-incident-response-strategy</loc><lastmod>2026-01-27T19:32:46.174Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/alarming-rise-of-ransomware-2024</loc><lastmod>2026-01-27T17:32:38.669Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/meaningful-risk-intelligence-report</loc><lastmod>2026-03-17T19:54:17.294Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-you-need-continuous-monitoring-to-reduce-risk</loc><lastmod>2026-03-17T19:29:08.455Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-nightmares-of-2019-the-breach-the-fine-and-the-reputation</loc><lastmod>2026-01-27T17:42:35.562Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/vendor-outreach-isnt-always-the-answer-when-a-high-profile-security-event-hits-your-cyber-ecosystem</loc><lastmod>2026-01-27T19:33:29.528Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-polyfill-supply-chain-attack-and-moveit-cisco-nx-os-openssh-apache-tomcat-progress-whatsup-gold-and-microsoft-mshtml-vulnerabilitiesfocus-friday-tprm-insights-on-polyfill</loc><lastmod>2025-10-25T16:38:48.829Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-your-risk-based-approach-to-third-party-risk-management</loc><lastmod>2026-01-27T19:40:45.835Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-greatest-security-risk-might-be-your-tprm-program-itself</loc><lastmod>2025-10-25T16:26:28.610Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-cyber-risk-in-third-party-risk-management</loc><lastmod>2026-01-27T19:37:58.846Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-snowflake-linked-breaches-from-a-tprm-supply-chain-perspective</loc><lastmod>2025-10-25T16:22:52.693Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/5-takeaways-from-2019-third-party-breaches</loc><lastmod>2025-11-19T19:05:49.580Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-serv-u-ftp-microsoft-sharepoint-citrix-netscaler-servicenow-exim-mail-and-geoserver-incidents-with-black-kites-focustags</loc><lastmod>2026-01-27T18:28:38.074Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-leaks-birth-certificates-over-750000-records-exposed</loc><lastmod>2026-01-27T19:22:27.347Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-march-2020</loc><lastmod>2026-02-18T20:24:09.677Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/no-hidden-costs-how-black-kite-redefines-tprm-solution-pricing</loc><lastmod>2025-11-20T16:17:00.527Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-third-party-in-third-party-risk-management</loc><lastmod>2026-01-27T19:39:11.863Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/think-like-a-hacker-for-successful-third-party-risk-management-tprm</loc><lastmod>2026-01-27T19:19:57.939Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/dont-use-an-srs-score-alone-to-manage-vendor-risk</loc><lastmod>2026-03-17T19:05:32.663Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/tprm-wake-up-call-are-you-one-cybersecurity-incident-away-from-chaos</loc><lastmod>2026-01-27T19:32:03.341Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/4-common-mistakes-cisos-make-when-presenting-to-the-board</loc><lastmod>2026-03-17T19:49:49.714Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-check-points-quantum-security-gateways-and-dnsbomb-attack-vulnerabilities-a-tprm-approach</loc><lastmod>2025-10-25T17:33:36.474Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/built-to-protect-the-importance-of-security-by-design-in-tprm</loc><lastmod>2026-01-27T17:39:46.460Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/beyond-prepare-for-the-worst-a-smarter-approach-to-cyber-risk-management</loc><lastmod>2026-01-27T17:36:19.403Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/heading-off-disruption-how-to-implement-truly-proactive-tprm</loc><lastmod>2026-01-27T18:34:55.594Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/blacksuit-royal-seized-under-operation-checkmate-no-arrests-mean-a-comeback-is-imminent</loc><lastmod>2026-01-27T17:38:06.564Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-riskbusters-crack-the-case-of-team-size-anxiety-in-tprm</loc><lastmod>2026-01-27T19:17:03.491Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-research-finds-presidential-candidates-making-the-most-of-cybersecurity-investments</loc><lastmod>2025-10-25T14:45:33.792Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/new-potential-phishing-domains-targeting-top-50-banks-rise-14-in-first-half-of-2019-new-black-kite-research-finds</loc><lastmod>2025-10-26T01:51:25.482Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-september-2019</loc><lastmod>2025-10-26T01:41:54.101Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-a-comprehensive-analysis-of-cve-2024-3400-and-its-risks</loc><lastmod>2025-10-27T12:51:58.320Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/microsoft-sharepoint-under-siege-cve-2025-53770-exploited-via-toolshell-rce-chain</loc><lastmod>2025-10-30T14:22:51.514Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/citrixdeelb-what-the-latest-citrix-vulnerabilities-mean-for-tprm</loc><lastmod>2026-01-27T17:40:49.965Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-data-quality-impacts-risk-management</loc><lastmod>2026-03-17T19:34:21.597Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/buyer-beware-how-to-spot-false-claims-about-ai-innovation-in-cybersecurity-products</loc><lastmod>2026-01-27T17:40:03.711Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-you-want-human-experts-behind-your-tprm-data-black-kite-research--intelligence-team-brite</loc><lastmod>2026-01-27T19:48:32.136Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-cybersecurity-impact</loc><lastmod>2026-01-27T17:31:21.726Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-traditional-third-party-risk-management-falls-short</loc><lastmod>2026-01-27T19:47:20.780Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cascading-and-concentration-risk-how-do-they-impact-your-digital-supply-chain</loc><lastmod>2026-01-27T17:40:28.942Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-the-salesloft-drift-incident-means-for-tprm</loc><lastmod>2026-01-27T19:41:25.545Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-actions-for-critical-citrix-netscaler-and-salesforce-tableau-vulnerabilities</loc><lastmod>2026-01-27T18:14:42.714Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/by-2020-more-than-3500-new-phishing-domains-will-be-active-targeting-50-major-banks</loc><lastmod>2025-10-26T01:49:56.235Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/health-institutions-suffer-third-party-data-breaches-exposing-millions-of-patient-records-how-can-you-protect-against-another-breach</loc><lastmod>2026-01-27T18:35:17.784Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/github-account-of-canonical-ubuntu-maker-hacked-cyber-risk--third-party-code-sharing-sites</loc><lastmod>2025-10-25T05:45:43.275Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-enables-organizations-to-calculate-potential-financial-impact-of-cyber-attacks-on-suppliers-and-partners</loc><lastmod>2025-10-25T05:44:07.676Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-august-2019</loc><lastmod>2025-10-25T05:42:48.811Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-measure-what-hackers-know-about-you</loc><lastmod>2026-01-27T18:41:48.585Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-actions-for-madeyoureset-ivanti-connect-secure-postgresql-plesk-obsidian</loc><lastmod>2026-01-27T18:15:48.167Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-is-sponsoring-the-wicked6</loc><lastmod>2025-10-25T05:40:22.352Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-focustags-gave-one-customer-peace-of-mind-during-the-unexpected-crowdstrike-outage</loc><lastmod>2026-03-17T19:42:01.268Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/from-policing-to-partnering-rethinking-the-third-party-risk-management-process</loc><lastmod>2026-01-27T18:33:00.270Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/collaboration-to-win-the-war-on-cyber-threats</loc><lastmod>2026-01-27T17:41:34.635Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-breaches-revealed-in-june-2019</loc><lastmod>2025-10-26T01:48:45.319Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/deep-web-and-black-market</loc><lastmod>2025-10-30T13:57:39.036Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/3rd-party-risk-management</loc><lastmod>2026-01-27T17:27:09.923Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/bitcoin-exchange-sites-safe</loc><lastmod>2025-11-04T17:14:10.233Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cybersecurity-technology-summit</loc><lastmod>2026-01-27T17:43:51.080Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/are-your-assets-at-risk-of-being-victimized-or-weaponized-in-a-memcached-ddos-attack</loc><lastmod>2025-11-04T17:14:55.736Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-breaches-revealed-in-may-2019</loc><lastmod>2026-01-27T18:50:10.119Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-security-with-artificial-intelligence-in-10-questions</loc><lastmod>2025-11-26T15:35:27.496Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/state-election-commissions-facing-and-fighting-mounting-cyber-challenges-new-black-kite-research-finds</loc><lastmod>2025-10-25T05:29:57.331Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/general-data-protection-regulation-gdpr-and-cyber-insurance</loc><lastmod>2026-01-27T18:33:22.444Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cyber-insurance-7-questions-ask-about-cyber-security</loc><lastmod>2025-11-20T21:50:33.014Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-black-kite-election-report-educating-about-cyber-risk-assessment</loc><lastmod>2025-11-02T15:51:27.657Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/steps-to-mitigate-what-happened-in-the-capital-one-data-breach</loc><lastmod>2026-01-27T19:09:53.998Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/supply-wisdom-and-black-kite-partner-to-enhance-cybersecurity-coverage</loc><lastmod>2025-10-25T05:25:45.633Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-mattermost-arbitrary-file-write-and-mongodb-denial-of-service-vulnerabilities</loc><lastmod>2026-01-27T18:17:48.384Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/an-attack-on-3rd-party-advertising-company-increased-cyber-risk-of-european-e-commerce-sites</loc><lastmod>2026-01-27T17:33:04.092Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/are-there-any-domains-impersonating-your-company-for-phishing</loc><lastmod>2025-10-25T05:20:31.176Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-recognized-on-the-10-most-promising-cybersecurity-solution-providers-list</loc><lastmod>2025-10-25T05:18:01.298Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/hold-your-annual-reports-for-late-massive-data-breaches-quora-and-marriott</loc><lastmod>2026-01-27T18:37:27.757Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/new-generation-ransomware-groups-are-a-growing-threat</loc><lastmod>2026-01-27T18:58:13.916Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-implement-vulnerability-management-in-tprm</loc><lastmod>2026-03-17T19:52:10.466Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/popular-video-sharing-platform-hit-by-credential-stuffing-attack</loc><lastmod>2026-02-18T20:34:47.038Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-tridium-niagara-and-elastic-kibana-vulnerabilities</loc><lastmod>2026-01-27T18:19:04.845Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-breaches-revealed-in-november-2018</loc><lastmod>2025-11-20T15:35:33.995Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-breaches-revealed-in-january-2019</loc><lastmod>2026-01-27T17:15:33.399Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-launches-industry-first-rapid-cyber-risk-scorecard</loc><lastmod>2026-01-27T17:36:37.119Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-respond-to-a-data-breach-in-your-supply-chain</loc><lastmod>2026-01-27T18:43:10.277Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-february-2020</loc><lastmod>2025-10-25T06:22:41.831Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-ivanti-epmm-and-sap-netweaver-vulnerabilities--ongoing-threat-actorransomware-groups-activity</loc><lastmod>2026-01-27T18:24:39.189Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-ccpa-perspective-into-third-party-risk-management</loc><lastmod>2025-11-19T19:07:59.144Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-zimbra-draytek-vigor-atlassian-jira-data-center-tornado-and-mdaemon-vulnerabilities</loc><lastmod>2026-01-27T18:19:54.243Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-do-online-meeting-tools-respond-to-increasing-security-and-privacy-issues</loc><lastmod>2025-11-19T19:51:52.790Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-counting-cves-misses-the-real-third-party-risk</loc><lastmod>2026-01-27T19:44:38.965Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/monitoring-third-parties-continuously-a-nist-perspective</loc><lastmod>2026-01-27T18:57:53.517Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/shady-websites-pushing-pharmaceuticals-trying-to-capitalize-on-covid-19-fears</loc><lastmod>2025-11-20T16:56:02.824Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/tprm-insights-grafana-clamav-vulnerabilities</loc><lastmod>2026-01-27T19:31:45.219Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-releases-2025-ransomware-report-revealing-123-increase-in-ransomware-attacks-over-two-years</loc><lastmod>2026-01-27T17:37:02.096Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-january-2020</loc><lastmod>2026-01-27T18:50:32.916Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/a-message-from-our-ceo</loc><lastmod>2025-10-25T04:46:54.000Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/top-ten-data-breaches-caused-by-a-third-party-in-the-last-decade</loc><lastmod>2026-01-27T19:27:20.140Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/have-you-built-a-password-fortress-risky-passwords-of-2022</loc><lastmod>2026-01-27T18:34:11.268Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-in-samba-server-atlassian-jira-tp-link-omada-minio-squid-proxy-and-sauter-ey-modulo-vulnerabilities</loc><lastmod>2026-01-27T18:13:33.142Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/maturing-a-third-party-risk-management-program-using-the-open-fair-model-to-improve-due-diligence-and-action-plans</loc><lastmod>2026-01-27T18:56:03.225Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/open-banking-and-cyber-security-in-10-questions</loc><lastmod>2025-10-25T04:37:20.974Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/vendorinsight-and-black-kite-announce-partnership-to-provide-advanced-cybersecurity-monitoring-services</loc><lastmod>2025-10-25T04:35:29.511Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/scam-alert-consumers-need-to-watch-out-this-holiday-season--the-number-of-fake-e-commerce-sites-is-spiking</loc><lastmod>2025-10-25T04:33:51.512Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-integrate-black-kites-fair-analysis-into-a-third-party-risk-management-tprm-program</loc><lastmod>2026-01-27T18:41:28.804Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-in-ransomware</loc><lastmod>2026-01-27T17:32:17.310Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/misconfigured-server-by-the-third-party-vendor-exposed-28-million-customer-records</loc><lastmod>2025-10-25T04:29:31.164Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/pentest-vs-security-rating-services</loc><lastmod>2025-10-25T04:28:12.929Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-citrix-bleed-2-and-wing-ftp-server-vulnerabilities</loc><lastmod>2026-01-27T18:21:53.937Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-october-2019</loc><lastmod>2025-10-25T06:21:37.765Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-december-2019</loc><lastmod>2025-10-25T06:19:32.319Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/another-bucket-leak-third-party-pr-firm-serving-top-name-brands-exposed-customers-data</loc><lastmod>2026-01-27T17:33:24.900Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-reliable-risk-data-unlocks-vendor-engagement</loc><lastmod>2026-01-27T18:39:11.022Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/nightmare-on-f5-street-deconstructing-the-f5-breach-and-its-systemic-supply-chain-risk</loc><lastmod>2026-01-27T18:58:42.967Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-november-2019</loc><lastmod>2025-11-20T15:47:01.313Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-actions-for-django-freepbx-and-hashicorp-vault-vulnerabilities</loc><lastmod>2026-01-27T18:15:21.986Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-exactly-does-the-term-risk-mean-to-you</loc><lastmod>2026-01-27T19:34:14.925Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/introducing-black-kite-bridge-to-reduce-supply-chain-risk</loc><lastmod>2026-01-27T18:46:55.042Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-patch-management</loc><lastmod>2025-10-24T22:22:44.321Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/supply-chain-cyber-risk-are-finally-part-of-the-nist-cybersecurity-framework</loc><lastmod>2025-10-24T22:23:41.075Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/malicious-javascripts-how-can-you-get-hacked</loc><lastmod>2026-01-27T18:55:07.866Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-tackle-third-party-vulnerabilities-without-breaking-the-bank</loc><lastmod>2026-01-27T18:44:21.413Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/patricia-titus-markels-chief-privacy-and-information-security-officer-joins-black-kite-board-of-directors</loc><lastmod>2025-10-25T04:10:33.986Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/number-of-possible-phishing-domain-rises-towards-the-end-of-2018</loc><lastmod>2025-11-25T22:37:32.580Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-intertwined-relationship-between-credit-ratings-and-cyber-risk-scores-after-the-downgrade-of-equifaxs-rating-by-moodys</loc><lastmod>2026-01-27T19:16:38.976Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/what-is-a-cyber-ecosystem</loc><lastmod>2026-01-27T19:34:51.651Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/do-your-executives-really-understand-the-risk-of-cybersecurity-in-your-supply-chain</loc><lastmod>2026-01-27T17:44:53.349Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/5-reasons-cyber-insurance-underwriters-need-security-ratings</loc><lastmod>2026-01-27T17:28:37.480Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/fastest-growing-companies-keep-pace-managing-cyber-risk-but-blind-spots-remain-according-to-black-kite-cyber-risk-scorecard-research</loc><lastmod>2025-10-25T03:58:42.092Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/third-party-attack-on-cryptocurrency-exchange-gate-io</loc><lastmod>2026-01-27T19:20:17.477Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/key-takeaways-2025-ransomware-report</loc><lastmod>2026-01-27T18:49:19.406Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-exchange-server-mssql-n-able-n-central-rmm-and-squid-proxy-vulnerabilities</loc><lastmod>2026-01-27T18:22:15.057Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-in-sharepoint-toolshell-and-grafana-vulnerabilities</loc><lastmod>2025-10-30T13:09:06.314Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/ai-wont-fix-your-tprm-mess-but-heres-what-might</loc><lastmod>2025-11-18T14:55:16.919Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-sonicwall-sophos-and-salesforce-tableau-vulnerabilities</loc><lastmod>2026-01-27T18:29:50.815Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-friday-special-potential-phishing-sites-have-quadrupled-in-the-last-6-months</loc><lastmod>2025-10-25T06:08:29.776Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/more-than-1300-potential-phishing-domains-that-impersonate-major-airlines-were-registered-this-year</loc><lastmod>2025-10-25T06:05:35.096Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/dvv-solutions-enhances-its-third-party-cyber-risk-capabilities-with-black-kites-scorecards</loc><lastmod>2025-10-25T03:33:43.302Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-takes-on-our-first-ever-seed-round-of-vc-funding</loc><lastmod>2025-10-25T03:30:41.681Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-named-bostinno-fire-award-honoree-for-2024</loc><lastmod>2025-10-25T03:28:41.455Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/manufacturing-at-risk-why-securing-your-supply-chain-is-critical</loc><lastmod>2025-10-25T03:26:53.288Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risk-insights-into-atlassian-jira-ivanti-connect-secure-and-nostromo-nhttpd-vulnerabilities-with-black-kites-focustags</loc><lastmod>2025-10-25T03:24:03.108Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-recognized-in-the-2024-red-dot-design-awards</loc><lastmod>2025-10-25T05:07:52.364Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/lessons-and-useful-tips-from-3-years-of-llm-fine-tuning-and-optimization</loc><lastmod>2025-11-18T16:01:52.234Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-exchange-server-rce-fortimanager-grafana-roundcube-webmail-and-cisco-fmc-vulnerabilities-from-a-tprm-perspective</loc><lastmod>2025-10-25T05:07:00.176Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-litespeed-cache-ricoh-web-image-monitor-squid-proxy-and-xlight-ftp-vulnerabilities-with-black-kites-focustags</loc><lastmod>2025-10-25T05:05:50.443Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-sharepoint-mssql-and-sap-netweaver-critical-vulnerabilities</loc><lastmod>2026-01-27T18:29:06.492Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-jetty-jenkins-and-cups-vulnerabilities</loc><lastmod>2026-01-27T18:25:05.464Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/riskbusters-reveal-tprm-is-more-than-a-technical-problem-its-a-business-imperative</loc><lastmod>2025-10-24T23:41:50.988Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-goanywhere-mft-solarwinds-web-help-desk-cisco-snmp-and-dnn-software-vulnerabilities</loc><lastmod>2026-01-27T18:24:03.021Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-tpcrm-teams-feel-spread-thin-and-3-coverage-strategies</loc><lastmod>2025-10-24T23:18:18.773Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-achieves-iso-270012022-certification-reinforcing-commitment-to-information-security-excellence</loc><lastmod>2025-11-26T14:22:09.490Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-into-oracle-weblogic-server-and-github-enterprise-vulnerabilities</loc><lastmod>2025-10-24T22:50:20.258Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-reveals-new-cloud-asset-mapping-capabilities-</loc><lastmod>2025-10-24T22:33:34.416Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-truth-about-security-ratings</loc><lastmod>2026-01-27T19:18:05.310Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-strategies-in-the-wake-of-change-healthcare-breachfocus-friday-tprm-strategies-in-the-wake-of-change-healthcare-breach</loc><lastmod>2026-01-27T18:31:32.826Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/httpsblafocus-friday-tprm-insights-on-cisco-asa-ftd-ios-vmware-vcenter-wd-my-cloud-and-formbricks-vulnerabilitiesutm_sourcefeedly</loc><lastmod>2026-01-27T18:45:08.982Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/get-security-event-info-from-your-vendors-with-focustags</loc><lastmod>2026-01-27T18:33:45.318Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/when-the-shai-hulud-worm-awakens-tinycolors-fall-and-the-new-era-of-supply-chain-risk</loc><lastmod>2026-01-27T19:43:06.041Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-black-kites-ai-isnt-just-marketing-its-a-movement</loc><lastmod>2025-12-23T15:31:33.281Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-respond-a-data-breach-in-your-supply-chain</loc><lastmod>2025-10-22T20:36:43.010Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/vendor-risk-assessments-why-scaling-feels-impossible-and-what-to-do-about-it</loc><lastmod>2026-03-17T18:54:55.296Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-critical-vulnerabilities-in-sonicwall-ivanti-progress-and-gocd</loc><lastmod>2026-01-27T17:50:47.890Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/when-ransomware-ruins-the-supply-chain-lessons-from-blue-yonder-and-the-rise-of-termite-ransomware-group</loc><lastmod>2026-01-27T19:42:46.557Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-pan-os-postgresql-and-apache-airflow-vulnerabilities</loc><lastmod>2025-10-25T01:02:20.723Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-cleo-file-transfer-beyondtrust-pra-and-rs-and-ivanti-cloud-services-application-vulnerabilities</loc><lastmod>2026-01-27T18:21:21.236Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/cl0ps-exploitation-of-cleo-puts-the-supply-chain-at-immediate-risk</loc><lastmod>2026-01-27T17:41:13.536Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-solve-vendor-outreach-during-security-crisis-events</loc><lastmod>2026-03-17T19:46:07.498Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-apache-tomcat-crushftp-and-gogs-server-vulnerabilities</loc><lastmod>2026-01-27T18:20:43.834Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-third-party-risks-from-critical-juniper-junos-rsync-and-simplehelp-vulnerabilities</loc><lastmod>2026-01-27T17:55:25.546Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-qlik-sense-cleo-file-transfer-and-sap-netweaver-java-vulnerabilities</loc><lastmod>2026-01-27T18:28:12.604Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/why-healthcare-is-now-in-the-bullseye-for-ransomware-groups</loc><lastmod>2026-01-27T19:45:29.882Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/keeping-your-head-out-of-the-tigers-mouth-with-proactive-cybersecurity</loc><lastmod>2026-01-27T18:48:42.790Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-vendors-dilemma-how-to-manage-customer-security-requests-without-losing-your-mind</loc><lastmod>2026-01-27T19:18:35.335Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-research-reveals-growing-persistence-sophistication-and-aggression-within-cybercrime-ecosystem</loc><lastmod>2025-10-25T00:39:15.609Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/black-kite-gives-organizations-the-power-to-solve-nth-party-cyber-risk-with-first-of-its-kind-supply-chain-monitoring-module</loc><lastmod>2025-10-25T00:32:57.130Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-sisense-client-and-crushftp-vulnerabilities-a-tprm-approach</loc><lastmod>2025-10-25T00:31:24.707Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/could-tprm-have-foreseen-the-xz-utils-cve-2024-3094-crisis</loc><lastmod>2025-10-25T00:29:59.922Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-addressing-the-hpe-aruba-networking-devices-and-tinyproxy-vulnerabilities-a-tprm-approach</loc><lastmod>2025-10-25T00:27:57.770Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-critical-postgresql-and-pgadmin-vulnerabilities</loc><lastmod>2025-10-25T00:12:35.795Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/major-third-party-data-breaches-revealed-in-april-2020</loc><lastmod>2025-11-20T15:42:08.402Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/the-breach-the-fine--more-a-third-party-perspective-into-gdpr</loc><lastmod>2026-01-27T19:10:26.813Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/have-you-patched-your-holes-6-simple-things-for-patch-management</loc><lastmod>2026-01-27T18:34:34.999Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-perspectives-on-mssql-redis-and-zimbra-vulnerabilities-with-black-kites-focustags</loc><lastmod>2026-01-27T18:30:51.567Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-the-black-kite-parser-aids-procurement-and-compliance-management</loc><lastmod>2026-01-27T18:39:32.554Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/understand-dora-in-4-questions-and-how-to-automate-vendor-compliance-with-ai</loc><lastmod>2026-01-27T19:32:22.028Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-hackers-leverage-your-ip-addresses-ip-reputation-as-a-cyber-risk-assessment-metric</loc><lastmod>2025-10-24T22:21:38.080Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/add-your-iot-devices-to-your-third-party-cyber-risk-assessments</loc><lastmod>2025-10-24T22:21:17.302Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/did-we-accomplish-to-hack-hawkings-brain-looking-at-cyber-security-from-hawkings-view</loc><lastmod>2025-10-24T22:20:56.469Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/is-your-website-ready-for-gdpr</loc><lastmod>2026-01-27T18:48:16.651Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-f5-big-ip-apt-risk-exchange-server-sharepoint-gladinet-and-flowise-vulnerabilities</loc><lastmod>2025-11-04T14:37:48.119Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/focus-friday-tprm-insights-on-oracle-ebs-jenkins-redis-draytek-vigor-zimbra-elastic-django-grafana-sillytavern-and-wp-yoast-seo</loc><lastmod>2025-10-24T22:56:12.079Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/how-to-avoid-ransomware-a-cisos-guide-to-outsmarting-attackers</loc><lastmod>2026-01-27T18:39:57.363Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://blackkite.com/blog/12-million-customer-records-leaked-in-godaddy-data-breach</loc><lastmod>2026-01-27T17:22:41.549Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
</urlset>