Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    fig13-1-2-3

    Measuring ATT&CK Flow in Ripple Incidents

    In our latest analysis, we thoroughly explored a treasure trove of nearly 900 ...
    fig12-2

    Data Exfiltration & Impact within Ripple Events

    In our most recent analysis, we delved into a wealth of nearly 900 ripple events ...
    fig07-2-4

    Post Compromise Techniques Used in Multi-Party Cyber Events

    In our most recent analysis, we delved into a wealth of almost 900 ripple events from the past, with the aim of uncovering the prevailing techniques employed by MITRE ...

    Cybersecurity Incident Response: Preparation

    An effective incident response plan can be an invaluable asset when it comes to detecting and mitigating cyber threats. A robust plan should include playbooks, procedures, and communication ...
    Pasta representing Risk Apetite

    A Complete Guide to Risk Appetite

    Many risk management professionals conflate risk appetite with risk tolerance. In reality, risk appetite should be the result of an extensive risk management analysis conducted within a framework ...
    Application Security

    How You Can Set Up Application Security

    Application security protects data and software from cybercriminals, whether the application was developed in-house or from a third-party service provider, regardless of where it resides or how ...

    All You Need to Understand Web Application Security

    In today's interconnected world, web application security has become crucial in fortifying cybersecurity defenses. The amount of data processed and stored in web-based applications increases as ...

    Crafting Cybersecurity for Your Small Business

    According to the Small Business Administration, there are more than 33 million ...
    fig05-2-1

    Ripples in 2023: Observing MITRE Att&ck techniques

    In our latest analysis, we looked into a treasure trove of nearly 900 ripple events ...
    Ripples-v3-featured-image-250x177

    ANALYZING TOP ATT&CK TECHNIQUES USED IN MULTI-PARTY CYBER EVENTS

    Sometimes, seemingly small, isolated events can trigger widespread consequences. Such is the case when the effects of one organization’s security incident spill over ...