Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Ransomware Detection: Safeguard Your Data and Defy Cyber Extortion

    In our interconnected digital landscape, the rise of ransomware poses a significant challenge to individuals, organizations, and ...
    NIST Cybersecurity Framework 2.0

    The NIST Cybersecurity Framework 2.0: What It Is and Why It's Changing

    A strong inverted example is how governments and court systems have struggled to keep up with emerging concerns in the evolving digital landscape. Policy gaps present loopholes that can be ...
    hand holding textboxes nist 800 37

    The NIST Special Publications: 800-37

    Is your company required to comply with the NIST framework because of a federal contract or subcontract? Or, on the other hand, are you interested in using a proven method of security planning and ...
    Guy in Background showing numbers NIST Special Publications: 800-53

    Using The NIST Special Publications: 800-53

    What is NIST Special Publication 800-53? The NIST SP 800-53A revision 5,

    Stay on Top of Ransomware Prevention

    Today’s threat landscape is evolving quickly. To keep on top of ever-increasing risks, it’s vital to learn about ransomware prevention and how to avoid one of the more common and damaging forms of ...
    Cybersecurity compliance

    Part II - OSFI Guideline B-10: How to Best Achieve Compliance

    The cyber threat landscape is constantly evolving. To advise federally regulated financial institutions on how to manage cybersecurity,

    Navigating The Digital Frontier: IT Risk Management

    In today's technology-driven world, where businesses rely heavily on digital systems and data, managing IT risks has become paramount.
    cybersecurity guide

    Part I - Understanding OSFI Compliance Regulation and Adherence

    Navigating and adhering to a constantly evolving compliance regulation can be challenging for third-party partitioners. And, this challenge can be ...

    The Complete Guide to Critical Infrastructure in Cybersecurity

    The rapid acceleration of digital transformation in the modern world has created a host of new threats and challenges for business leaders.

    It's All About Strategic Risk Management

    As organizations continue to operate in an uncertain and competitive environment riddled with threats to their operations, including climate catastrophes, supply chain disruptions, and ...