Cybersecurity does not and cannot stop for anything—it is an ongoing effort. The evolving nature of cyber threats makes it critical for organisations to educate, implement, and encourage employees to follow cyber best practices. The new trends in IoT, social media, and BYOD have made businesses more susceptible to cyber threats. Today, business leaders need to focus more of their … Read More
Gaining actionable insight into security risk ratings for mergers and acquisitions
RiskXchange can aid in effectively managing cybersecurity risks during mergers and acquisitions. Gaining actionable insight into security risk ratings for mergers and acquisitions (M&A) enables businesses to measure the cybersecurity performance of potential portfolio companies or acquisition targets. The need for security risk ratings follows concerns over cyber risks and the importance of cyber assessment during M&A. It is important … Read More
Why you should be benchmarking your cybersecurity performance against industry peers
RiskXchange allows you to compare your rating to that of your competitors to remain one step ahead. Benchmarking your cybersecurity performance against industry peers will not only ensure your organisation stands out in the crowd but will help improve its cybersecurity programs. By assessing the effectiveness of your organisation’s tools, policies, and processes, you will remain one step ahead of … Read More
Lessons we can learn from SolarWinds’ supply chain hack
Days away from Christmas and weeks away from a new year, this challenging year got a whole lot more threatening. On December 8th, US cybersecurity firm FireEye disclosed that they were hacked. Sophisticated, state-backed hackers had stolen their penetration testing tools. Since then, more developments continue to come to light each day. It is now identified as the biggest supply … Read More
Is Rudolph a risk this season? What you need to know about third-party risk management
Companies today are relying more and more on third parties to grow and thrive. According to Gartner research from 2019, over 60% of organisations were working with more than 1000 third parties. While this is all business as usual, the more this occurs, the more organisations are exposed to risk. Third parties have greater access to organisational data assets. For … Read More
Smart cities and cyber risk management: are we there yet?
As urban cities continue to increase in population, many are becoming ‘smart cities’ through digital transformation. This transformation intends to make resident lives more convenient, governance more effective, and resource consumption more efficient. Smart cities are also increasing economic efficiency, reducing public expenditure, and decreasing environmental output. They are, therefore, a very necessary model for the resource-strapped future we’re facing. … Read More
How vulnerabilities like Zerologon can impact your cyber risk ratings
Vulnerabilities like Zerologon are not a problem for RiskXchange. The Zerologon (CVE-2020-1472) vulnerability was recently identified by the National Security Agency (NSA) as one of the top 25 vulnerabilities being exploited by Chinese state-sponsored actors to hack organisations all over the world. RiskXchange advises businesses globally to act immediately to protect their assets against Zerologon. Whether it is your organisation, or the … Read More
Peer comparisons of cyber risk ratings: how they support your firm’s cyber assessment processes
An important part of your security processes involves assessing the effectiveness of your organisation’s policies and tools to make sure you’re staying ahead of the curve. To gain insight into your cybersecurity performance, you need clear, continuous, and actionable metrics that you can track over time and compare against your peers and competitors. Comparing and quantifying your cybersecurity posture against … Read More
Understanding attack surfaces and how they influence your cybersecurity
RiskXchange has developed an innovative way to reduce an attack surface and allow organisations to manage them at the same time. The attack surface of your organisation is the number of attack vectors that could be used to gain entry to launch a cyberattack or gain unauthorised access to private and sensitive data. This could include vulnerabilities in your staffing, network, physical or software environments. In … Read More