Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Making the Case for Cybersecurity Ratings

    By: Kelly White, Founder, RiskRecon by Mastercard

    Vendor-Based Breach Events Now 32% of Total

    By: Kelly White, Founder, RiskRecon by Mastercard

    The Power of Risk Ratings Platforms: Driving Better Risk Decisions

    By: Kelly White, Founder, RiskRecon by Mastercard
    Ransomware-One-year-Look-Back-Industry---250

    Change in Cybersecurity Hygiene One Year After Ransomware

    By: Kelly White, Founder, RiskRecon, a Mastercard Company Having ...
    RansomwareHygiene1-250

    Analyzing the Cybersecurity Hygiene of Ransomware Victims

    By: Kelly White, Founder, RiskRecon, a Mastercard Company
    ITSPmagazine+LOGO+-+Square+v2

    A Conversation on Digital Transformation and Third-Party Risk

    Only a small segment of the industry has gotten on board with the idea that they own the risk associated with the end-to-end supply chain that makes their business run. Many focus on ...
    carlos-irineu-da-costa-442504-unsplash

    What You Need to Know about the NYDFS Cybersecurity Regulations

    If you’re even loosely connected to the financial services industry, you’ve no doubt heard about the newest cybersecurity requirements issued by the New York State Department of Financial Services ...
    People looking at monitors learning risk surface

    What's Risk Surface?

    You’ve likely never heard the term “risk surface” before, but it’s an important concept that captures the way modern enterprises must manage risk. To that end, we’re providing an in-depth ...
    graphic-node-1652437-unsplash (1)

    You Can’t Manage What You Can’t Measure – Integrating Risk Formulas into Your Cyber Risk Management Framework

    By Kelly White | July 2, 2018 Calculating cyber risk is a key element of any sound risk management strategy. While traditional risk management ...
    008_gold_4000x3000_zcool

    Security Vulnerabilities Don’t Equal Security Risk – So How Do You Prioritize?

    By Kelly White | May 31, 2018 While security vulnerabilities are found in many technologies, their presence ...