Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Percent of third-parties

    Balancing Third-Party Risk: Security Posture of Third-Parties

    Continuing along our journey of balancing third-party risk, we dive into ...
    Balancing Third-Party Risk with RiskRecon by Mastercard

    Balancing Third-Party Risk:  No Assumption is Safe

    Organizations have a lot of assumptions about third-party risk. Many assume their vendors have terrible security posture and represent grave danger to their business. Others assume the opposite— ...

    What Are APT Attacks, and How Do They Work?

    APT cybersecurity attacks are persistent threats. They represent dangers of a completely different magnitude from other attackers. Common cyber attacks like malware and phishing function as a ...
    IOC cybersecurity

    IOC Cybersecurity & Why You Need it

    IOC, short for Indicators of Compromise, is a type of cyber security data designed to help security professionals detect and respond to cyber threats. These indicators act like digital ...
    Laptop Blue SEIM

    A Guide to SEIM in Cybersecurity

    Security Information Event Management (SEIM; sometimes shown “SIEM”) is a set of software tools that combines the capabilities of Security Event Management (SEM) and Security Information ...
    digital skimming techniques

    New Digital Skimming Techniques: How RiskRecon Can Keep You Protected

    Attackers are improving their digital skimming techniques, using Modal Forms to fool cardholders. Cybersecurity researchers at

    Vulnerability In Cybersecurity: Finding and Fixing Your Cyberspace's Weak Points

    A vulnerability is any weakness in an Internet-connected system that can be used to launch and deliver a successful cyber attack. In most cases, a vulnerability in a cybersecurity system is either ...

    Cybersecurity Service: Helping Your Company Protect its Cybersecurity Assets.

    A company cannot afford to be hacked. A cybersecurity incident or attack can significantly damage a company or organization's reputation and income. While some companies or organizations can ...

    Cybersecurity Trends: How to Stay on Top of Them

    Cybersecurity trends are changing to keep up with the rapidly changing cybersecurity space. More and more data is harvested, stored, analyzed, and use. As a result, companies and organizations ...

    Cybersecurity Architecture: Improving Security by Starting with the Foundation

    Cybersecurity has a lot in common with structural integrity. Case in point, the most dangerous weaknesses are found in the foundation and framing. Flaws in the architecture itself undermine the ...