Enhancing Cybersecurity Decisions: Partnerships and Innovation

Locuz Inc Axio cyber risk management partnership cybersecurity risk assessment
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 2, 2025
3 min read

Locuz Inc. Joins With Axio

Axio, a leading SaaS provider of cyber risk management and quantification solutions, is collaborating with Locuz Inc., a security-led digital transformation company. This partnership aims to enhance the ability of organizations to make data-driven decisions regarding critical cybersecurity risks. The collaboration enables Locuz to conduct rapid cyber risk assessments and quantification, measuring risk in monetary terms.

Uttam Majumdar, Founder & President of Locuz Inc., stated, “In every cybersecurity engagement, we have taken a risk-based approach. In a world of machine speed attacks, it is imperative that we model cyber risk for our customers." This approach allows customers to effectively calculate and manage risk.

Locuz plans to work closely with Axio to develop a comprehensive risk-based cybersecurity strategy that will improve organizational resilience against cyber events. Scott Kannry, CEO of Axio, emphasized the effectiveness of Axio’s solution, describing it as “transparent, defensible, and actionable,” enabling organizations to confidently present results to their C-Suite and Board.

Locuz aims to provide a single solution that acts as a command center for continuous cyber risk assessment against evolving threats, facilitating optimal cybersecurity investment decisions. Learn more about Axio and Locuz Inc..

BlueVoyant and Auto-ISAC Partnership

BlueVoyant, a prominent player in cyber defense, has announced a partnership with the Automotive Information Sharing and Analysis Center (Auto-ISAC). This collaboration is set to bolster third-party cyber risk management in the automotive industry. The initiative introduces advanced monitoring, AI-enabled assessments, and industry-wide insights to enhance supply chain cybersecurity.

Through this partnership, Auto-ISAC will implement BlueVoyant's Third-Party Risk Management (TPRM) platform to assess and monitor supplier cyber postures comprehensively. The platform employs AI-enabled questionnaire management and continuous monitoring, providing real-time insights and actionable intelligence to member organizations, which include Original Equipment Manufacturers (OEMs), external risk assessors, and suppliers.

Joel Molinoff, Global Head of Third-Party Risk Management at BlueVoyant, remarked, "Our partnership with Auto-ISAC builds on BlueVoyant's mission to deliver comprehensive TPRM coverage and measurable risk reduction.” Faye Francy, Executive Director of Auto-ISAC, expressed optimism about developing a scalable TPRM assessment framework for the automotive sector.

This collaboration highlights the increasing significance of ISACs in enhancing sector-wide cyber defense and providing coordinated protection against third-party risks. Find out more information about the partnership here and read about their innovative approaches in our latest blog.

BlueVoyant Logo

BlueVoyant’s Cybersecurity Approach

BlueVoyant has established itself as a leader in cybersecurity by maintaining the agility of a start-up while possessing the expertise of well-established organizations. The company offers innovative solutions, including superior threat intelligence and third-party risk assessments, contributing to building a robust cybersecurity model.

Learn more about BlueVoyant's ongoing initiatives such as participation in the Microsoft Sentinel Partner Ecosystem and their partnership with Auto-ISAC to enhance third-party risk management across the automotive industry.

BlueVoyant Services

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article