Risk Management and
Cybersecurity Blog

Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?

Subscribe now

Smart cities and cyber risk management are we there yet RiskXchange The leader in Third-Party Cyber Risk Management

Smart cities and cyber risk management: are we there yet?

As urban cities continue to increase in population, many are becoming ‘smart cities’ through digital transformation. This transformation intends to ...
How vulnerabilities like Zerologon can RiskXchange The leader in Third-Party Cyber Risk Management

How vulnerabilities like Zerologon can impact your cyber risk ratings

Vulnerabilities like Zerologon are not a problem for RiskXchange. The Zerologon (CVE-2020-1472) vulnerability was recently identified by the National Security ...
Peer comparisons of cyber risk ratings how they support your firms cyber assessment processes RiskXchange The leader in Third-Party Cyber Risk Management

Peer comparisons of cyber risk ratings: how they support your firm’s cyber assessment processes

An important part of your security processes involves assessing the effectiveness of your organisation’s policies and tools to make sure ...
Understanding attack surfaces and how they influence your cybersecurity posture RiskXchange The leader in Third-Party Cyber Risk Management

Understanding attack surfaces and how they influence your cybersecurity

RiskXchange has developed an innovative way to reduce an attack surface and allow organisations to manage them at the same ...
Top Digital Supply Chain Risk Management Strategies RiskXchange The leader in Third-Party Cyber Risk Management

Top Digital Supply Chain Risk Management Strategies

RiskXchange provides a unique 360-degree cybersecurity risk rating management approach. Organisations are constantly in a state of digital transformation and ...
Vendor Risk Management VRM Audit Checklist RiskXchange The leader in Third-Party Cyber Risk Management

Vendor Risk Management Audit Checklist

RiskXchange’s VRM framework can identify and mitigate third-party risk factors, business uncertainties, legal liabilities, and repetitional damage. Vendor risk management ...
What is cyber risk quantification and why is it important RiskXchange The leader in Third-Party Cyber Risk Management

What is cyber risk quantification and why is it important?

While risk management is not a new concept to the security industry, condensing the complexity of cyber risk into numbers, ...
How to address the cybersecurity skills shortage in the future RiskXchange The leader in Third-Party Cyber Risk Management

How to address the cybersecurity skills shortage in the future

RiskXchange looks at the cybersecurity skills shortage and how to address the problem. A report by Cybersecurity Ventures has highlighted ...
Key Processes of Cyber Resilient Companies RiskXchange The leader in Third-Party Cyber Risk Management

Key Processes of Cyber Resilient Companies

RiskXchange enables organisations to remain flexible while ensuring business resilience and continuity in an ever-evolving environment. In today’s fast-paced, quickly ...

Smart cities and cyber risk management are we there yet RiskXchange The leader in Third-Party Cyber Risk Management

Smart cities and cyber risk management: are we there yet?

As urban cities continue to increase in population, many are becoming ‘smart cities’ through digital transformation. This transformation intends to ...
How vulnerabilities like Zerologon can RiskXchange The leader in Third-Party Cyber Risk Management

How vulnerabilities like Zerologon can impact your cyber risk ratings

Vulnerabilities like Zerologon are not a problem for RiskXchange. The Zerologon (CVE-2020-1472) vulnerability was recently identified by the National Security ...
Peer comparisons of cyber risk ratings how they support your firms cyber assessment processes RiskXchange The leader in Third-Party Cyber Risk Management

Peer comparisons of cyber risk ratings: how they support your firm’s cyber assessment processes

An important part of your security processes involves assessing the effectiveness of your organisation’s policies and tools to make sure ...
Understanding attack surfaces and how they influence your cybersecurity posture RiskXchange The leader in Third-Party Cyber Risk Management

Understanding attack surfaces and how they influence your cybersecurity

RiskXchange has developed an innovative way to reduce an attack surface and allow organisations to manage them at the same ...
Top Digital Supply Chain Risk Management Strategies RiskXchange The leader in Third-Party Cyber Risk Management

Top Digital Supply Chain Risk Management Strategies

RiskXchange provides a unique 360-degree cybersecurity risk rating management approach. Organisations are constantly in a state of digital transformation and ...
Vendor Risk Management VRM Audit Checklist RiskXchange The leader in Third-Party Cyber Risk Management

Vendor Risk Management Audit Checklist

RiskXchange’s VRM framework can identify and mitigate third-party risk factors, business uncertainties, legal liabilities, and repetitional damage. Vendor risk management ...
What is cyber risk quantification and why is it important RiskXchange The leader in Third-Party Cyber Risk Management

What is cyber risk quantification and why is it important?

While risk management is not a new concept to the security industry, condensing the complexity of cyber risk into numbers, ...
How to address the cybersecurity skills shortage in the future RiskXchange The leader in Third-Party Cyber Risk Management

How to address the cybersecurity skills shortage in the future

RiskXchange looks at the cybersecurity skills shortage and how to address the problem. A report by Cybersecurity Ventures has highlighted ...
Key Processes of Cyber Resilient Companies RiskXchange The leader in Third-Party Cyber Risk Management

Key Processes of Cyber Resilient Companies

RiskXchange enables organisations to remain flexible while ensuring business resilience and continuity in an ever-evolving environment. In today’s fast-paced, quickly ...