What is the main reason a Bridge invitation will throw an error, preventing the user from collaborating?
The users email domain is not listed in the Scanned Domains tab in the report
I'm a Super Admin, why can't I update finding statuses or alter the Digital Footprint
Company Ownership is required to make changes to the report (bonus: this is mapped using email domains and can be manually designated for subsidiaries)
Allows users to assign findings or share reports with external vendors
Black Kite Bridge
Remediation recommendations for Possible Vulnerabilities
Apply patches
What is Chris' favorite hockey team?
New York Rangers
Which technical category holds the most weight for the overall score?
Patch Management
Possible Vulnerability findings have been patched but are still active in the report
Since Black Kite can not detect when a patch has been applied using OSINT, the status of Possible Vulnerabilities must be manually updated
Provides users with a comprehensive breakdown of current CVEs, combined with vendor data and applied FocusTags.
Risk Intelligence
Remediation recommendations for Leaked Credentials
Update credentials
What was the founding name before it was Black Kite?
Normshield
How often is the report fully scanned, Digital Footprint and all 19 categories (Vendors, not self-monitored entities)
Monthly
I updated the status of Leaked Credential findings as Remediated but they're active again
Remediated status tells the system to re-scan the control, we can't detect remediation for these findings using OSINT
Allows users to see how and why the grade/scoring has changed over time
Timeline Report
Remediation recommendations for System is Outdated
Product update required
What year was Black Kite founded?
2016
How often is the report fully scanned, Digital Footprint and all 19 categories (Self-monitoring companies)
Weekly
These third-party assets still pose a risk because they are hosting your domains. Black Kite provides visibility into all vulnerabilities we can detect.
Comparison of an entity's cyber rating against the industry
Benchmark Report
Name two controls that need to be manually updated because we can not detect remediation using OSINT
Leaked Credentials, Possible Vulnerabilities, Hacktivist Shares, Fraudulent Domains
Which feature won a Red Dot Design Award?
Supply Chain
When do we display the "Small Digital Footprint" popup on a Company Overview page?
If the total number in a company's Domains, IP, and Subdomains tabs is 10 or less than 10
What's the difference between combolist and leaked credential findings?
Combolists consist of both old and new leaks, and often the source of the leak is not identified (we can't verify which leak it's from or when)
Allows users to to passively gather information and identify high-risk remote end-user work environments
Remote Workforce
Remediation recommendations for Fraudulent Domains
Contact abuse services of registrant companies to take down the fraudulent domains
Who were the original founders (other than Candan)
Bedirhan and Ozay