What is a zero trust security model?

RiskXchange RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange comes up with innovative solutions to everyday problems experienced at the hands of hackers. Principal Analyst of Forrester Research, John Kindervag founded the zero trust security model in 2010. The model, also known as perimeterless security, describes an approach to the design and implementation of IT systems. The zero trust concept is based around “never trust, always verify,” which means devices should … Read More

The relevance of continuous attack surface management across the supply chain

RiskXchange Why Use Continuous Attack Surface Management RiskXchange The leader in Third-Party Cyber Risk Management

While supply chain attacks have always undermined the stability and reliability of businesses, in the past few years, we’ve witnessed a disconcerting spike in these incidents, creating a greater level of disruption than previously anticipated. This has been confirmed in a recent study by the European Union Cybersecurity Agency, which revealed that the number of attacks on the supply chain … Read More

Vendor due diligence best practices we can expect to see in 2022

RiskXchange Vendor Due Diligence Best Practices In 2022 RiskXchange The leader in Third-Party Cyber Risk Management

Throughout 2020 and 2021, we saw threats to cybersecurity increase by a significant margin. This led to disastrous cyberattacks all across the world, such as the SolarWinds attack, which undermined company profitability and credibility. Social engineering attacks proved to be particularly devastating with multiple reports revealing that ransomware and phishing attacks were particularly successful in this timeframe. In 2022, we … Read More

Leveraging the common vulnerabilities and exposures (CVE) database to strengthen cybersecurity posture

RiskXchange Common Vulnerabilities And Exposures Database RiskXchange The leader in Third-Party Cyber Risk Management

As organisations across finance, healthcare, and logistics continue to transfer their operations to cloud-based applications, it raises concerns about third-party vendor attacks. Cyber attacks via third parties and vendors have been on the rise in recent years. Research shows over 1,767 reported data breaches in 2021, and experts claim that this number will go up within the next few years. … Read More

Best practices to improve cybersecurity posture in 2022

How To Improve Your Cybersecurity Posture RiskXchange RiskXchange The leader in Third-Party Cyber Risk Management

Cybersecurity posture or security posture is the holy grail of vendor security. It gives you a holistic perspective of your vendor security infrastructure, tells you how vulnerable you are to cyberattacks, and encourages you to use the best cybersecurity practices. With cyberattacks set to increase in 2022 and beyond, however, there are concerns over whether today’s cybersecurity posture reflects the … Read More

How has supplier due diligence responded to modern threats to supply chain

RiskXchange How has supplier due diligence responded to modern supply chain threats RiskXchange The leader in Third-Party Cyber Risk Management

On 2nd July 2021, Kaseya found their data stolen and held for ransom. Those who perpetrated the ransomware attack demanded over $70 million in payment to release the data, but the exposure of over 1500 of their clients to a potential ransomware attack was even more concerning for Kaseya.  An investigation into the attack revealed that there was a vulnerability … Read More