New Report: Black Kite’s 2025 Third-Party Breach Report is Here! Cyber threats targeting third-party vendors and supply chains reached new levels of sophistication in 2024. Our 6th annual Third-Party Breach Report uncovers how these incidents unfolded, the industries most affected, and the systemic vulnerabilities that allowed them to happen. Key insights from the report include: - Ransomware dominance – Third-party vendors remained a primary entry point for disruptive attacks. - Silent breaches – Many cyber incidents went unnoticed until their cascading effects disrupted entire industries. - Regulatory impact – Frameworks like GDPR, HIPAA, and DORA influenced cybersecurity improvements, but challenges remain. Read the full report and discover how to stay ahead of third-party cyber risks in 2025: https://lnkd.in/ewXjWiwq
Black Kite
IT Services and IT Consulting
Boston, Massachusetts 11,932 followers
The Power of Visibility | Third Party Cyber Risk Intelligence
About us
One in four organizations suffered from a cyber attack in the last year, resulting in production, reputation and financial losses. The real problem is adversaries attack companies via third parties, island-hopping their way into target organizations. At Black Kite, we're redefining vendor risk management with the world’s first global third-party cyber risk monitoring platform, built from a hacker's perspective. With 500+ customers across the globe and counting, we're committed to improving the health and safety of the entire planet's cyber ecosystem with the industry’s most accurate and comprehensive cyber intelligence. While other security ratings service (SRS) providers try to narrow the scope, Black Kite provides the only standards-based cyber risk assessments that analyze your supply chain's cybersecurity posture from three critical dimensions: technical, financial, and compliance.
- Website
-
https://blackkite.com/
External link for Black Kite
- Industry
- IT Services and IT Consulting
- Company size
- 51-200 employees
- Headquarters
- Boston, Massachusetts
- Type
- Privately Held
- Founded
- 2016
- Specialties
- Vulnerability Management, Targeted Cyber Threat Intelligence, Continuous Perimeter Monitoring, CyberSecurity, Cyber Risk Management, Cyber Insurance, Third Party Risk Management, Third Party Cyber Risk, Continuous Monitoring, Vendor Management, Supply Chain Risk Management, Due Diligence, and Reputational Risk
Locations
-
Primary
800 Boylston St
Suite 2905
Boston, Massachusetts 02199, US
Employees at Black Kite
Updates
-
Black Kite is excited to be sponsoring Shared Assessments 18th Annual Risk Summit 2025! Join our CSO, Bob Maley for speaking sessions on both days and stop by our booth to connect with our team! Alexandra Minuto Keith LeVan Conor Coveney Ryan Lahey After a day of insightful discussions, catch up with Black Kite for an exclusive cocktail social to unwind, network, and connect with top professionals in TPRM! From AI-driven risk insights to regulatory shifts, this is the event to gain cutting-edge strategies and network with top professionals in the field. If you're in TPRM, compliance, or cybersecurity, you won’t want to miss it! 📅 Date: March 26th - 27th 📍 Location: The Westin | Fort Lauderdale 📇 Register: https://lnkd.in/gxAJiY3 🍸 Cocktail Social: https://lnkd.in/ekCQ2WaY
-
-
As Bob Maley, Black Kite’s Chief Security Officer says, "Proactive third-party risk management is not optional anymore. It's essential to be able to survive.” Watch the full webinar recording, "The Ransomware Epidemic: Protecting Healthcare in 2025," and learn how to defend your organization. (Link in comments)
-
Check out the latest episode of Risk and Reels! This week Jeffrey Wheatman sits down with seasoned cybersecurity leader Kimberly Trapani to discuss the evolving role of the CISO. Listen now: https://lnkd.in/eGV3vEZS.
-
2024's top cyber incidents are shaping 2025 TPRM. Watch this: a breakdown of the Cencora ransomware attack that rocked the pharma supply chain with a record-breaking $75M ransom. This highlights the urgent need for strong third-party risk management. Cencora's swift response—experts, security, transparency—shows the importance of compliance (HIPAA). Black Kite customers can use our Supply Chain module for Nth party visibility and risk assessment. Watch the video now: https://lnkd.in/ej7b_-D9 Get more insights. Read the full 2025 Third-Party Breach Report at https://lnkd.in/etPJykse #Cybersecurity #ThirdPartyRisk #SupplyChainSecurity #Ransomware #DataBreach #HIPAA #BlackKite #CyberRiskManagement
Cencora: Among the Top 8 Cyber Incidents of 2024 in Black Kite's 2025 Third-Party Breach Report
https://www.youtube.com/
-
Ransomware in healthcare has hit epidemic levels. Ferhat Dikbiyik, Ph.D., CTIA, Black Kite’s Chief Research & Intelligence Officer, revealed that healthcare moved from #7 to #3 in ransomware targeting in a single year. Hear the alarming statistics in this short clip from our recent webinar. Watch the full webinar recording, "The Ransomware Epidemic: Protecting Healthcare in 2025," and learn how to defend your organization. (Link in comments)
-
🔗 Seamless workflows and smarter cyber risk management —now at your fingertips! We’re thrilled to share that our ServiceNow Third Party Risk Management integration is live in the ServiceNow Store. We’ve partnered to help organizations streamline third party assessment workflows, illuminate true third-party cyber risk, and improve program efficiency—all within the ServiceNow ecosystem. Automate and scale your cyber risk assessments and continuously monitor your entire vendor ecosystem with less effort. Check it out >> https://lnkd.in/eCT7SRSM
-
This week's Focus Friday blog examines Third-Party Risks In DrayTek Vigor Routers, VMware ESXi, Apache Tomcat, and Axios HTTP Client Vulnerabilities! Check it out now: https://lnkd.in/eRY6ANtC
-
Check out the latest episode of Risk and Reels! Jeffrey Wheatman (interviewing himself!) dives into the concept of the 'silent breach'—cybersecurity exposures that organizations don’t realize exist until it’s too late. Let us know how you improve risk assessment and response strategies? https://lnkd.in/eK6eEnpf