Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Unlock Business Value: Three Key Takeaways from Forrester’s Research on Mastercard Threat Protection

    In today’s digital landscape, where cyber threats are growing in frequency and diversity while organizations strive to maintain operational resilience, strategic investments in cybersecurity are ...

    Staying Resilient: Why Business Continuity and DDoS Protection are Non-Negotiables

    Businesses today face an array of cyber threats that can disrupt operations and compromise sensitive data. Among these are DDoS (Distributed Denial of Service) attacks which is when hackers use ...

    Breach Events and Geographics: Where to trust

    By: Kelly White, Founder, RiskRecon by Mastercard

    A Powerful Third-Party Breach Predictor

    By: Kelly White, Founder, RiskRecon by Mastercard

    Enhance Your Third-Party Risk Management with RiskRecon's Latest Module: Situational Awareness

    In today's rapidly evolving business landscape, the importance of effective risk management cannot be overstated.

    3 Critical Ransomware Lessons for TPRM Professionals | RiskRecon

    Over the last few years, ransomware attacks have escalated both in frequency and the scope of industries affected. Destructive ransomware events are a serious subset ...
    Untitled-1

    RiskRecon Named Global InfoSec Award Winner at RSA Conference 2024

    RiskRecon by Mastercard Wins "Cutting Edge Security ...
    third-party risk management

    Third-Party Risk Management Trends & Opportunities 2024

    In 2024, third-party risk management (TPRM) will become more crucial than ever. As supply chains expand and businesses continue to interconnect in complex ways, robust ...
    cyber risk mitigation

    Cyber Risk Mitigation: Building a Resilient Cybersecurity Foundation

    In the ever-evolving landscape of cyber security threat, organizations and individuals face an increasing need to protect their digital assets and data. Cyber risk mitigation stands ...
    understanding a problem

    Understanding NIST 800-207

    A typical organization’s infrastructure has become increasingly complicated. A single organization may operate many remote offices with its own local infrastructure, internal networks, cloud ...