Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Your Complete Guide to NIST 800-171

    If your organization works with Controlled Unclassified Information (CUI) or wants to work with the federal government, ...

    Ransomware Detection: Safeguard Your Data and Defy Cyber Extortion

    In our interconnected digital landscape, the rise of ransomware poses a significant challenge to individuals, organizations, and ...

    The NIST Cybersecurity Framework 2.0: What It Is and Why It's Changing

    A strong inverted example is how governments and court systems have struggled to keep up with emerging concerns in the evolving digital landscape. Policy gaps present loopholes that can be ...

    The NIST Special Publications: 800-37

    Is your company required to comply with the NIST framework because of a federal contract or subcontract? Or, on the other hand, are you interested in using a proven method of security planning and ...

    Using The NIST Special Publications: 800-53

    What is NIST Special Publication 800-53? The NIST SP 800-53A revision 5,

    Stay on Top of Ransomware Prevention

    Today’s threat landscape is evolving quickly. To keep on top of ever-increasing risks, it’s vital to learn about ransomware prevention and how to avoid one of the more common and damaging forms of ...
    Learn how RiskRecon can help meet OSFI regulations

    Part II - OSFI Guideline B-10: How to Best Achieve Compliance

    The cyber threat landscape is constantly evolving. To advise federally regulated financial institutions on how to manage cybersecurity,

    Navigating The Digital Frontier: IT Risk Management

    In today's technology-driven world, where businesses rely heavily on digital systems and data, managing IT risks has become paramount.
    RiskRecon guide on the Office of the Superintendent of Financial Institutions (OSFI)

    Part I - Understanding OSFI Compliance Regulation and Adherence

    Navigating and adhering to a constantly evolving compliance regulation can be challenging for third-party partitioners. And, this challenge can be ...

    The Complete Guide to Critical Infrastructure in Cybersecurity

    The rapid acceleration of digital transformation in the modern world has created a host of new threats and challenges for business leaders.