Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Screen Shot 2022-04-08 at 1.52.08 PM

    Learn How Your Organization Can Benefit from a Proactive TPRM Program

    By: Kaarthick Subramanian, ComplyScore ComplyScore has released a new Ebook in our series exploring enterprise third-party risk ...
    Ransomware-Events-by-Day-of-the-Week-250

    Ransomware Lesson 3: Important suppliers need 24x7 security operations

    By: Kelly White, Founder, RiskRecon, a Mastercard Company
    Revisit inherent risk ratings to protect against ransomware threats

    Ransomware Lesson 2: Revisit Your Supplier Inherent Risk Ratings

    By: Kelly White, Founder, RiskRecon, a Mastercard Company I suspect that in the pre-ransomware world, most supplier inherent risk rating models were weighted primarily towards ...
    SystemswithRansomware250

    Ransomware Lesson 1: Use suppliers with good cybersecurity hygiene

    By: Kelly White, Founder, RiskRecon, a Mastercard Company I once heard an advertisement for a car wash in which the company claimed that cars that are washed weekly last something ...
    5LessonsRansomwareWebsiteGraphic_250x177-1

    Five lessons from analysis of 633 destructive ransomware events

    By: Kelly White, Founder, RiskRecon, a Mastercard Company
    Ransomware-One-year-Look-Back-Industry---250

    Change in Cybersecurity Hygiene One Year After Ransomware

    By: Kelly White, Founder, RiskRecon, a Mastercard Company Having ...
    RansomwareHygiene1-250

    Analyzing the Cybersecurity Hygiene of Ransomware Victims

    By: Kelly White, Founder, RiskRecon, a Mastercard Company
    Alliance-program-social-card3-250

    Mastercard Launches Global Cybersecurity Alliance Program to Further Secure The Digital Ecosystem

    New program helps partners accelerate growth and provide scaled delivery of critical cybersecurity and risk services
    PercentofLossesTsunami250

    How ripple multi-party breaches propagate?

    Where do ripple events stem from? This question may well be top of mind now more than ever, as these types of events become commonplace. That is why we made it a point to learn as much as we could ...
    RiskRecon Security Incident Alert

    2022 Yields Tighter Log4j Compliance Standards: How to Stay Ahead

    On January 4, 2022, the Federal Trade Commission ...