<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=5551212&amp;fmt=gif">

Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    How to Use a Qualitative Risk Assessment

    When trying to identify a vulnerability in cybersecurity, a qualitative risk assessment is one of the important tools you can use. Understanding what this type of risk analysis is and the impact ...
    Exclusive Ignition RR-1

    Exclusive Networks, Ignition Technology and Mastercard Forge Strategic Cybersecurity Partnership Across EMEA

    Exclusive Networks, a globally trusted cybersecurity specialist for digital infrastructure, together with its SaaS focused cybersecurity division
    Percent of Third-Party Relationships

    Balancing Third-Party Risk: Taking Time to Calibrate

    This article continues our series on a recent research report, that examined nearly ...

    Understanding Supply Chain Risk Management

    When you have a supply chain that is at risk, you must ensure you mitigate that risk as best you can to avoid supply chain disruption. With proper supply chain risk management, you can avoid ...
    mc_symbol_opt_53_3x

    What We Learn From Cybersecurity Research

    Digital systems and networks have changed and will continue to change the world. They can deliver massive societal benefits and are critical to our security, economic growth, and well-being. ...
    Percent of third-parties

    Balancing Third-Party Risk: Security Posture of Third-Parties

    Continuing along our journey of balancing third-party risk, we dive into ...
    Balancing Third-Party Risk with RiskRecon by Mastercard

    Balancing Third-Party Risk:  No Assumption is Safe

    Organizations have a lot of assumptions about third-party risk. Many assume their vendors have terrible security posture and represent grave danger to their business. Others assume the opposite— ...

    What Are APT Attacks, and How Do They Work?

    APT cybersecurity attacks are persistent threats. They represent dangers of a completely different magnitude from other attackers. Common cyber attacks like malware and phishing function as a ...

    IOC Cybersecurity & Why You Need it

    IOC, short for Indicators of Compromise, is a type of cyber security data designed to help security professionals detect and respond to cyber threats. These indicators act like digital ...

    A Guide to SEIM in Cybersecurity

    Security Information Event Management (SEIM; sometimes shown “SIEM”) is a set of software tools that combines the capabilities of Security Event Management (SEM) and Security Information ...