Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Shared Responsibility Model in Cloud Computing: What You Need to Know

    Because of the magnitude of the target, cloud-based organization data is often a magnet for malicious attacks from hackers both within and outside of enterprises. A single security threat can cost ...
    Padlock with guy on laptop showing Effective Security Controls

    A Comprehensive Guide to Implementing Effective Security Controls

    Security controls are crucial in influencing cybersecurity professionals' actions in safeguarding organizations. There are three fundamental types of IT security controls, including ...

    Security in the Internet of Things

    The IoT is important to the interconnectivity of the internet in our technological world. However, along with automation comes risk. It's crucial for consumers and ...
    Industries impacted by breach events since 2012.

    Industries Impacted the Most by Breaches Events Since 2012

    In our latest research endeavor, experts from RiskRecon, a Mastercard Company, dove into 10 years of publicly disclosed breach events to offer ...
    defense in depth cybersecurity

    Defense in Depth in CyberSecurity

    The digital world is evolving daily. You can do much to boost your sales, from monitoring your target customers to collecting their data to enhance your ...
    Cybersecurity Frameworks

    An Introduction to Cybersecurity Frameworks, and Why They’re Needed

    Like most critical business outcomes, data privacy and system security don’t happen by accident. A disorganized, haphazard approach to cybersecurity does little to protect users, the system, or ...

    Why Healthcare Cybersecurity is Critical to Protecting Patient Privacy

    Cybersecurity in the healthcare industry is a growing field. As more and more patient information and systems come online, it leaves plenty of room for cyber attackers to exploit ...
    RiskRecon breach event study

    RiskRecon Study: 10 Years of Breach Event Monitoring

    Earlier this month, we released a ...

    All You Need to Know About Cybersecurity Incident Response

    If an incident occurs, security team members need to know what to do and who is responsible for specific tasks. They need to know who to contact and the proper steps to follow. The aftermath and ...

    Cybersecurity Policy: How to Hack-Proof Your Business

    Cyber threats are one of the biggest risks in any business in this technology era. Hackers are more advanced than ever, and the damages they are causing are big and expensive—some have the ...