Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Understanding Supply Chain Risk Management

    When you have a supply chain that is at risk, you must ensure you mitigate that risk as best you can to avoid supply chain disruption. With proper supply chain risk management, you can avoid ...
    mc_symbol_opt_53_3x

    What We Learn From Cybersecurity Research

    Digital systems and networks have changed and will continue to change the world. They can deliver massive societal benefits and are critical to our security, economic growth, and well-being. ...
    MoveIt vulnerability

    MOVEit Exploit Hitting High-Profile Targets: What You Need To Know

    By: Mastercard Security Research Team Multiple high-profile targets, including federal government agencies in the United States, have been hit by a ...
    Percent of third-parties

    Balancing Third-Party Risk: Security Posture of Third-Parties

    Continuing along our journey of balancing third-party risk, we dive into ...
    Magecart-Style Campaign

    New Magecart-Style Campaign Hijacks Legitimate Sites to Attack Others

    By: Mastercard Security Research Team A
    Balancing Third-Party Risk with RiskRecon by Mastercard

    Balancing Third-Party Risk:  No Assumption is Safe

    Organizations have a lot of assumptions about third-party risk. Many assume their vendors have terrible security posture and represent grave danger to their business. Others assume the opposite— ...

    What Are APT Attacks, and How Do They Work?

    APT cybersecurity attacks are persistent threats. They represent dangers of a completely different magnitude from other attackers. Common cyber attacks like malware and phishing function as a ...

    IOC Cybersecurity & Why You Need it

    IOC, short for Indicators of Compromise, is a type of cyber security data designed to help security professionals detect and respond to cyber threats. These indicators act like digital ...

    A Guide to SEIM in Cybersecurity

    Security Information Event Management (SEIM; sometimes shown “SIEM”) is a set of software tools that combines the capabilities of Security Event Management (SEM) and Security Information ...

    New Digital Skimming Techniques: How RiskRecon Can Keep You Protected

    Attackers are improving their digital skimming techniques, using Modal Forms to fool cardholders. Cybersecurity researchers at