Risk management and
cybersecurity blog

How to protect personally identifiable information

How to protect personally identifiable information from a cyber breach 

In recent years, personally identifiable information (PII) such as social security numbers, medical history, and banking details have become a ...
Read More
Cyber ecosystem - your Supply chain attack protection

How a cyber ecosystem works – your protection against a supply chain attack

A cyber ecosystem is very much like a physical ecosystem. Within a cyber ecosystem, individuals, organisations, and external parties interact with ...
Read More
Why conduct a Cybersecurity Posture Assessment

Why a Cybersecurity Posture Assessment is a must?

Why you should assess you cybersecurity posture? As enterprises move to the cloud, tens and thousands of assets are being ...
Read More
How to use NIST SP 800-61 guide for third-party risk?

How to use NIST SP 800-61 guide to be better prepared for third-party risk

As your business grows, so does its third-party ecosystem. But with growth comes a greater sense of responsibility which entails ...
Read More
Network vendor risk assessment

New vendor risk assessment with SIG in 2022

The Standard Information Gathering (SIG) questionnaire is a configurable tool to enable the scoping of a diverse vendor risk assessment using ...
Read More
Cyber Risk Management in Healthcare

How to handle Cyber Risk Management in Healthcare

In 2020, over 81% of UK healthcare organisations were hit by ransomware attacks, which had disastrous consequences on healthcare services, ...
Read More
Network authentification methods on the Internet for cyber security

Top network authentication methods to prevent data breaches

RiskXchange helps companies of all sizes fight the threat of cyberattack by providing instant risk ratings and helping you prevent ...
Read More
Riskxchange Protect your website against formjacking attacks RiskXchange The leader in Third-Party Cyber Risk Management

How to protect your website against a formjacking attack?

In 2018, over 4800 websites were compromised by formjacking attacks, further 3.7 million attacks were blocked. Major corporations like British ...
Read More
RX How To Manage Vendor Cyber Risks Effectively RiskXchange The leader in Third-Party Cyber Risk Management

Strategies for effective third-party risk management

As corporate and government stakeholders realise the value of vendor security, your cybersecurity team has to devise a more effective ...
Read More