Vendor Risk Management Insights


      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.


      Celebrating National Cybersecurity Awareness Month

      Happy October! This month marks the 18th annual 

      The Evolution of Digital Extortion: How to Address Today’s Ransomware

      Today, cybercrime is big business. Attackers understand the world we live in. They understand how law enforcement and standard cyber defenses ...

      The Ripple Data Set

      For the second time in a row, we used Advisen’s Cyber Loss Database to uncover the scope of multi-party incidents since 2008. Containing over 103,000 cyber events collected from publicly ...

      RiskRecon Wins 2021 Enterprise Risk Management Software of the Year

      RiskRecon, a Mastercard Company is proud to announce that we have been selected as the winner of the “Enterprise Risk Management Software of the Year" award ...

      Defining Ripple Events

      In today’s technology-led business climate, organizations don’t just share information rampantly across company lines— they also share platforms and technology ...
      Untitled design (13) copy

      CISA’s Top Routinely Exploited Vulnerabilities

      As evidenced by the continuous flow of news headlines detailing new victims and real-world consequences, the trend of cyber vulnerabilities being exploited is only continuing to grow. As a result, ...

      New Research Compares Multi-Party Data Breaches to Single Party Events

      Data breaches and security exposures are bad enough when they impact one ...
      RiskRecon Sept 2021 Product Update

      RiskRecon Enhances Platform with New Reporting Capabilities

      In a continued effort to drive innovation and meet the growing needs of today’s businesses, RiskRecon has announced enhancements to the platform’s reporting features ...

      RiskRecon's View into the Kaseya Attack

      In early July software provider, Kaseya announced it had been the victim of a ransomware attack by the infamous Russian-based hacking group, REvil.  While the initial scope was hard to ...

      Bringing Clarity to Uncertainty

      With enterprises critically dependent on such large and complex supply chains, traditional methods of managing third-party risk simply do not provide the timely, accurate information necessary to ...