Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Cybersecurity hygiene of firms with public breach event

    Measuring Cybersecurity Hygiene at the time of a Breach Event

    Throughout our detailed analysis of 8,892 publicly reported breach events occurring between 2012 and 2021, we've gleaned many insights that can assist risk management ...
    Holiday season breach event activities analyzed by RiskRecon.

    Are there more breach events during the holiday season?

    Within this blog post, readers will learn if breach events are more common during peak holiday seasons and the time elapsed from the actual breach to the public ...
    Actors and vectors behind 9,000 breach events

    Examining the threat actors and vectors behind 9,000 breach events

    In this post, we are looking at our analysis of ...

    Risk Management Strategies For Your Business

    What is a risk management strategy? Risk management is processing, identifying, and managing legal, financial, and security risks to a company's earnings and capital. The idea behind ...
    Operational Risk on a Monitor

    Understanding Operational Risk in Business

    Risk is a part of almost everything we do in life, including the day-to-day operations of a business. Learning to assess risk and apply mitigation strategies can help businesses minimize the ...

    Risk Management Software: Less Risk, More Business

    You can learn a great deal from an individual, a group, or even a whole organization, by how they respond to risk. Risk aversion is often the result of a history of painful losses, for example. ...
    Are larger or smaller companies hit by breach events more often?

    Are large or small companies impacted more by breach events?

    In this blog, we examine the role of company size in

    Governance Risk and Compliance: How to Make it Work for You

    A house without rules is a messy house.

    The Best Practices in Cybersecurity

    The world is slowly becoming increasingly digital. More interactions, processes, and procedures occur in the digital space than ever before. Vast amounts of data are gathered, stored, and used ...

    How to Implement Vendor Risk Management Practices and Processes

    In a study RiskRecon recently conducted, it was found that most companies' ...