Black Kite Standards-Based Scoring Spotlight
Letter grades designed for transparency and accuracy
Open standards you can trust
Helps to eliminate false positives
- Non-intrusive scans using open-source intelligence (OSINT) techniques collect detailed external data without ever touching the target
- Once collected, the data is categorized and graded according to MITRE Cyber Threat Susceptibility Assessment (CTSA) methodology
Be as agile as adversaries
See risk from a hacker's perspective
- Hackers also use OSINT resources to target victims
- We perform contextualization and analysis to convert the same data into risk intelligence
- Black Kite has more than 500 control points corresponding to MITRE's Tactics, Techniques and Procedures (TTP)
More than MITRE
Black kite maps it's data to many trusted frameworks:
- Common Weakness Risk Analysis Framework (CWRAF)
- Common Weakness Scoring System (CWSS)
- Common Vulnerability Scoring System (CVSS)
- Open FAIR™ (Factor Analysis of Information Risk)
- Exploit Prediction Scoring System (EPSS)
