Knowledge Base
Organization Settings
Custom Organization Email Domain
Artifact Intelligence Trust Center
VISO TRUST Roles & Permissions
Netksope Application Risk Exchange Plugin
How to Create an API Access Token
How To Configure The VISO TRUST Netskope Application Risk Exchange (ARE) Plugin
How To Configure Coupa Supplier Sync
Customize branding for your organization
Relationships and Assessments
Follow-up questionnaires
Supplemental Questionnaires
VISO TRUST Risk Assessment Process
Starting an Assessment
All About Risk Review and Remediation
Lifecycle Management for Relationships
Creating a relationship
Vendor AI Q&A
Trust AI Q&A
How To Import New or Existing Relationships
Understanding Risk
Frequently asked questions
Product Updates
Public Risk Event Notice
Outabox Data Breach
DROPBOX, INC. Cybersecurity Incident
Sisense Security Incident
Optum Security Incident
Persistent Malicious Campaign: Exploiting Exchange Server Vulnerability Leading to Data Breach in Azure Cloud Environments
Infosys McCamish Data Breach Hits Bank of America
ConnectWise ScreenConnect Authentication Bypass Vulnerability
AnyDesk Security Incident
Okta's Support System Security Incident
Cloudflare Security Breach
VF Corporation Data Breach Incident
HealthEC LLC (HEC) Cyber Security Event
Orrick Herrington & Sutcliffe LLP Breach Incident
New Relic’s Security Incident
Citrix Hypervisor Security Incident
Citrix NetScaler ADC and NetScaler Gateway vulnerabilities
Sumo Logic Potential Security Incident
Arietis Health Security Incident
Fiserv Security Incident
Cisco IOS XE Software Web Management User Interface vulnerabilities
CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence Data Center and Server
JumpCloud's Ongoing Incident: API Key Reset
Progress Software MOVEit Zero-Day Vulnerability
AvidXchange Security Incident
GoAnywhere MFT (Fortra) Incident
LastPass Incident
GoDaddy Incident
CircleCI Incident
OpenSSL Vulnerability
- All Categories
- Knowledge Base
- Understanding Risk
- Risk Network
Risk Network
Updated by Christian Coffey
Risk Network
During an assessment, artifacts are analyzed and validated by both Artifact Intelligence and our team of expert auditors. These validations—though most notably used to compute risk—also contain valuable data that fuels other areas on the platform such as your Risk Network.
To start, navigate to the Relationships page and switch the toggle from List to Graph.
This is your Risk Network, a visual representation of your third and nth parties. By clicking any of the green nodes (third parties) you can reveal nth parties, which show in blue.
Click any nth parties to reveal information about that organization, create a relationship with them, and more!