Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      Ripples-Receivers-Generators-250

      Who is involved with Ripples Events?

      Let’s take a look at the kinds of organizations most likely to be involved in a ripple event, including the generating organizations, recipients of downstream loss ...
      Tsunami-blog-250

      Tsunami Report: The damage from major multi-party data breaches

      In almost every way imaginable, we live in a hyperconnected world. ...
      Ripple-Event-Count-250

      NEW 2020 RIPPLE EVENT EXAMPLES IN ACTION

      Before we broadly discuss who is getting caught in ripple events, how much ripples are costing organizations, how long they take to unfold, and what’s potentially ...
      Cybersecurity-Awareness-250

      Celebrating National Cybersecurity Awareness Month

      Happy October! This month marks the 18th annual 
      iStock-1022030450-1

      The Evolution of Digital Extortion: How to Address Today’s Ransomware

      Today, cybercrime is big business. Attackers understand the world we live in. They understand how law ...
      Ripple-Data-Set

      The Ripple Data Set

      For the second time in a row, we used Advisen’s Cyber Loss Database to uncover the scope of multi-party incidents since 2008. Containing over 103,000 cyber events ...
      RiskRecon_Twitter_CyberSecurity-Breakthrough-Awards2021-250

      RiskRecon Wins 2021 Enterprise Risk Management Software of the Year

      RiskRecon, a Mastercard Company is proud to announce that we have been selected as the winner of the “Enterprise Risk Management ...
      Ripples-2021-250x177

      Defining Ripple Events

      In today’s technology-led business climate, organizations don’t just share information rampantly across company lines— they also ...
      Untitled design (13) copy

      CISA’s Top Routinely Exploited Vulnerabilities

      As evidenced by the continuous flow of news headlines detailing new victims and real-world consequences, the trend of cyber vulnerabilities being exploited is only ...
      Ripples-2021-250x177

      New Research Compares Multi-Party Data Breaches to Single Party Events

      Data breaches and security exposures are ...