Ransomware Risk: Automotive Manufacturing in 2021 Read more →

Technical Cyber Rating

The Most Comprehensive and Accurate Technical Intelligence.

The Black Kite Technical Rating provides easy-to-understand letter grades and defensible data details behind 20 risk categories. The non-intrusive report passively evaluates third parties, and does not touch an organization’s systems or network assets.

Free Cyber Rating

Easy-to-Understand Letter GradesCalculated by Defensible Data

Black Kite follows and applies commonly-used frameworks developed by the MITRE Corporation for scoring software weaknesses in a consistent, flexible, and transparent manner, converting highly technical terms into simple letter grades.

C+
1X A
3X B
5X C
7X D
8X F
8X more likely to be breached

Vulnerability Prioritization

Black Kite provides a graphical distribution in the form of a heat map to determine the status and severity of each finding. Our platform leverages MITRE and NIST to further confirm the criticality of each threat.

Powerful Performance behind 20 Categories

The total score is a weighted average of 20 category components, providing unmatched breadth and insight into detected vulnerabilities.

Tap on items to learn more.

With Financial Impact Correlations

Now That I Have the Data – What Do I Do With It? Black Kite’s Strategy Report

Black Kite’s Strategy Report shares feedback to help executives to understand their cyber risk posture and scale return on cybersecurity investments. The report provides simple steps to help remediate issues and mitigate cyber risks with suppliers and partners. Helpful One-Pager →

Benefits

Receive simple, outlined steps

Multiple formats available for download (PDF, Excel, etc.)

Prioritize tasks based on critically

Trusted by

What Our Clients Are Saying

RECENT UPDATES

SIMPLIFYING VENDOR SECURITY ASSESSMENTS, PART II: Questions to Ask Along the Road
SIMPLIFYING VENDOR SECURITY ASSESSMENTS, PART II: Questions to Ask Along the Road
As we discussed in Part I: Designing Your VRA Roadmap, a successful vendor security audit program requires organizati…
Read More
SIMPLIFYING VENDOR RISK ASSESSMENTS, PART I: Designing Your VRA Roadmap
SIMPLIFYING VENDOR RISK ASSESSMENTS, PART I: Designing Your VRA Roadmap
Cybercriminals have averted from high-value targets, and are now honed in on those organizations with weaker cyber po…
Read More
The Top Five Third-Party Data Breaches in June 2021, Revealed
The Top Five Third-Party Data Breaches in June 2021, Revealed
Automotive manufacturers have stepped up into the passenger’s seat of the cybercrime hit list. Digital transformation…
Read More
Ransomware Day Strikes Again: What Kaseya Should Teach Us
Ransomware Day Strikes Again: What Kaseya Should Teach Us
By Bob Maley, CSO, Black Kite Black Kite does not utilize Kaseya servers nor work with Kaseya in any way. After…
Read More
The Most Common Cybersecurity Threats Facing Supply Chains in 2021
The Most Common Cybersecurity Threats Facing Supply Chains in 2021
As we enter the second half of 2021 and reflect back on the previous six months, it’s clear that all eyes are now on …
Read More

Ready to get started?