Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Risk Identification: Being Prepared for the Worst

    Every company is exposed to risks that could threaten to shut it down. These risks might be obvious or less so. However, a robust risk management plan ensures a business's continued operation. ...
    1200-x-630-Banner-1

    Massive ESXiArgs Ransomware Attack Targets VMware ESXi Servers

    In February 2021, VMware, a cloud computing company specializing in virtualization software, released a fix for a critical vulnerability that allowed for remote code execution. Now, two ...

    Everything You Need to Know About Risk Reduction

    Recently, there has been a massive increase in threat volume and sophistication, as many hackers adopt tactics to evade detection and efficiently carry out high-value attacks. Our recent

    Top Benefits of AWS Cloud Security

    AWS cloud security is designed to help protect data, accounts, and workloads from unauthorized access. It includes services that encrypt data, enforce access controls, and manage encryption ...
    RiskRecon is the winner of three cybersecurity excellence awards in 2023

    RiskRecon Recognized as Triple Gold Standard by 2023 Cybersecurity Excellence Awards

    RiskRecon, a Mastercard Company Wins Gold in Third-Party Security Risk Management, Cybersecurity Assessment, and Third-Party Risk Management award ...
    Cybersecurity hygiene of firms with public breach event

    Measuring Cybersecurity Hygiene at the time of a Breach Event

    Throughout our detailed analysis of 8,892 publicly reported breach events occurring between 2012 and 2021, we've gleaned many insights that can assist risk management ...
    Holiday season breach event activities analyzed by RiskRecon.

    Are there more breach events during the holiday season?

    Within this blog post, readers will learn if breach events are more common during peak holiday seasons and the time elapsed from the actual breach to the public ...
    Actors and vectors behind 9,000 breach events

    Examining the threat actors and vectors behind 9,000 breach events

    In this post, we are looking at our analysis of ...

    Risk Management Strategies For Your Business

    What is a risk management strategy? Risk management is processing, identifying, and managing legal, financial, and security risks to a company's earnings and capital. The idea behind ...

    Understanding Operational Risk in Business

    Risk is a part of almost everything we do in life, including the day-to-day operations of a business. Learning to assess risk and apply mitigation strategies can help businesses minimize the ...