Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    jefferson-santos-9SoCnyQmkzI-unsplash

    Developing Effective Cybersecurity Architecture

    Cybersecurity breaches abound, and the pace of cyber violations is increasing yearly. At the same time, organizations and individuals are also becoming increasingly aware of cybersecurity risks ...

    Cybersecurity Basics: Understanding the Basics of Cyber Threats and Protection

    Cybersecurity is a growing concern. According to Statista, in the third quarter of 2022, nearly

    Shared Responsibility Model in Cloud Computing: What You Need to Know

    Because of the magnitude of the target, cloud-based organization data is often a magnet for malicious attacks from hackers both within and outside of enterprises. A single security threat can cost ...
    Padlock with guy on laptop showing Effective Security Controls

    A Comprehensive Guide to Implementing Effective Security Controls

    Security controls are crucial in influencing cybersecurity professionals' actions in safeguarding organizations. There are three fundamental types of IT security controls, including ...

    Security in the Internet of Things

    The IoT is important to the interconnectivity of the internet in our technological world. However, along with automation comes risk. It's crucial for consumers and ...
    Industries impacted by breach events since 2012.

    Industries Impacted the Most by Breaches Events Since 2012

    In our latest research endeavor, experts from RiskRecon, a Mastercard Company, dove into 10 years of publicly disclosed breach events to offer ...
    defense in depth cybersecurity

    Defense in Depth in CyberSecurity

    The digital world is evolving daily. You can do much to boost your sales, from monitoring your target customers to collecting their data to enhance your ...
    Cybersecurity Frameworks

    An Introduction to Cybersecurity Frameworks, and Why They’re Needed

    Like most critical business outcomes, data privacy and system security don’t happen by accident. A disorganized, haphazard approach to cybersecurity does little to protect users, the system, or ...

    Why Healthcare Cybersecurity is Critical to Protecting Patient Privacy

    Cybersecurity in the healthcare industry is a growing field. As more and more patient information and systems come online, it leaves plenty of room for cyber attackers to exploit ...
    RiskRecon breach event study

    RiskRecon Study: 10 Years of Breach Event Monitoring

    Earlier this month, we released a ...