Enhancing Cybersecurity Decisions: Partnerships and Innovation

Locuz Inc Axio cyber risk management partnership cybersecurity risk assessment
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 2, 2025 3 min read

Locuz Inc. Joins With Axio

Axio, a leading SaaS provider of cyber risk management and quantification solutions, is collaborating with Locuz Inc., a security-led digital transformation company. This partnership aims to enhance the ability of organizations to make data-driven decisions regarding critical cybersecurity risks. The collaboration enables Locuz to conduct rapid cyber risk assessments and quantification, measuring risk in monetary terms.

Uttam Majumdar, Founder & President of Locuz Inc., stated, “In every cybersecurity engagement, we have taken a risk-based approach. In a world of machine speed attacks, it is imperative that we model cyber risk for our customers." This approach allows customers to effectively calculate and manage risk.

Locuz plans to work closely with Axio to develop a comprehensive risk-based cybersecurity strategy that will improve organizational resilience against cyber events. Scott Kannry, CEO of Axio, emphasized the effectiveness of Axio’s solution, describing it as “transparent, defensible, and actionable,” enabling organizations to confidently present results to their C-Suite and Board.

Locuz aims to provide a single solution that acts as a command center for continuous cyber risk assessment against evolving threats, facilitating optimal cybersecurity investment decisions. Learn more about Axio and Locuz Inc..

BlueVoyant and Auto-ISAC Partnership

BlueVoyant, a prominent player in cyber defense, has announced a partnership with the Automotive Information Sharing and Analysis Center (Auto-ISAC). This collaboration is set to bolster third-party cyber risk management in the automotive industry. The initiative introduces advanced monitoring, AI-enabled assessments, and industry-wide insights to enhance supply chain cybersecurity.

Through this partnership, Auto-ISAC will implement BlueVoyant's Third-Party Risk Management (TPRM) platform to assess and monitor supplier cyber postures comprehensively. The platform employs AI-enabled questionnaire management and continuous monitoring, providing real-time insights and actionable intelligence to member organizations, which include Original Equipment Manufacturers (OEMs), external risk assessors, and suppliers.

Joel Molinoff, Global Head of Third-Party Risk Management at BlueVoyant, remarked, "Our partnership with Auto-ISAC builds on BlueVoyant's mission to deliver comprehensive TPRM coverage and measurable risk reduction.” Faye Francy, Executive Director of Auto-ISAC, expressed optimism about developing a scalable TPRM assessment framework for the automotive sector.

This collaboration highlights the increasing significance of ISACs in enhancing sector-wide cyber defense and providing coordinated protection against third-party risks. Find out more information about the partnership here and read about their innovative approaches in our latest blog.

BlueVoyant Logo

BlueVoyant’s Cybersecurity Approach

BlueVoyant has established itself as a leader in cybersecurity by maintaining the agility of a start-up while possessing the expertise of well-established organizations. The company offers innovative solutions, including superior threat intelligence and third-party risk assessments, contributing to building a robust cybersecurity model.

Learn more about BlueVoyant's ongoing initiatives such as participation in the Microsoft Sentinel Partner Ecosystem and their partnership with Auto-ISAC to enhance third-party risk management across the automotive industry.

BlueVoyant Services

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article