Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Understanding DDoS Attacks and How They Work

    Understanding DDoS Attacks and How They Work Years ago, DDoS attacks were seen as small, inconvenient, minor annoyances, but things ...
    System Risk Assessment

    Understanding System Risk Assessment

    In today’s world of swiftly changing digital landscape, businesses face the ever-present threat of security risks to both their networks and data. To help mitigate these risks effectively, ...

    A Quick Guide to NIST Compliance

    NIST compliance is an essential step for anyone working with federal data. Compliance can help prevent breaches while shielding your business from fines, lawsuits, or losing future contracts.

    Your Complete Guide to NIST 800-171

    If your organization works with Controlled Unclassified Information (CUI) or wants to work with the federal government, ...

    Ransomware Detection: Safeguard Your Data and Defy Cyber Extortion

    In our interconnected digital landscape, the rise of ransomware poses a significant challenge to individuals, organizations, and ...

    The NIST Cybersecurity Framework 2.0: What It Is and Why It's Changing

    A strong inverted example is how governments and court systems have struggled to keep up with emerging concerns in the evolving digital landscape. Policy gaps present loopholes that can be ...
    hand holding textboxes nist 800 37

    The NIST Special Publications: 800-37

    Is your company required to comply with the NIST framework because of a federal contract or subcontract? Or, on the other hand, are you interested in using a proven method of security planning and ...
    Guy in Background showing numbers NIST Special Publications: 800-53

    Using The NIST Special Publications: 800-53

    What is NIST Special Publication 800-53? The NIST SP 800-53A revision 5,

    Stay on Top of Ransomware Prevention

    Today’s threat landscape is evolving quickly. To keep on top of ever-increasing risks, it’s vital to learn about ransomware prevention and how to avoid one of the more common and damaging forms of ...
    Cybersecurity compliance

    Part II - OSFI Guideline B-10: How to Best Achieve Compliance

    The cyber threat landscape is constantly evolving. To advise federally regulated financial institutions on how to manage cybersecurity,