Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    A Powerful Third-Party Breach Predictor

    By: Kelly White, Founder, RiskRecon by Mastercard

    Vendor-Based Breach Events Now 32% of Total

    By: Kelly White, Founder, RiskRecon by Mastercard

    Enhance Your Third-Party Risk Management with RiskRecon's Latest Module: Situational Awareness

    In today's rapidly evolving business landscape, the importance of effective risk management cannot be overstated.

    3 Critical Ransomware Lessons for TPRM Professionals | RiskRecon

    Over the last few years, ransomware attacks have escalated both in frequency and the scope of industries affected. Destructive ransomware events are a serious subset ...

    The Power of Risk Ratings Platforms: Driving Better Risk Decisions

    By: Kelly White, Founder, RiskRecon by Mastercard
    Untitled-1

    RiskRecon Named Global InfoSec Award Winner at RSA Conference 2024

    RiskRecon by Mastercard Wins "Cutting Edge Security ...
    third-party risk management

    Third-Party Risk Management Trends & Opportunities 2024

    In 2024, third-party risk management (TPRM) will become more crucial than ever. As supply chains expand and businesses continue to interconnect in complex ways, robust ...
    cyber risk mitigation

    Cyber Risk Mitigation: Building a Resilient Cybersecurity Foundation

    In the ever-evolving landscape of cyber security threat, organizations and individuals face an increasing need to protect their digital assets and data. Cyber risk mitigation stands ...
    understanding a problem

    Understanding NIST 800-207

    A typical organization’s infrastructure has become increasingly complicated. A single organization may operate many remote offices with its own local infrastructure, internal networks, cloud ...
    threat intelligence

    Threat Intelligence Frameworks: Choosing The Right Approach

    The digital environment is ever-changing, with businesses constantly looking to safeguard their assets from endless cyber attacks. Amid that, threat intelligence has ...