Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    RiskReconer: Deepak Jeevankumar - CEO Builder

    By: Kelly White, Founder and CEO, RiskRecon If you are starting a cybersecurity company, you will be very fortunate if you win the seed ...

    The Industries that Cause the Widest Breach Ripples

    Many cyber breaches today impact organizations far beyond the initial victim. Depending on the incident, the effects can ripple across numerous other parties, ...
    Downstream impact of databreaches

    What Makes Measuring Cyber Ripples So Hard: Part 2

    In late 2019 RiskRecon partnered with Cyentia Institute to examine the effect of cyber incidents on companies downstream of the initial attack. In part two of this blog series with the data ...
    How many organizations have affected by multi-party data breaches?

    What Makes Measuring Cyber Ripples So Hard: Part 1

    A couple of months ago RiskRecon partnered with the data scientists at the

    EBA: Third-Party Risk Strategy

    In July 2019, UK authorities announced that Marriott Hotels would be fined $124 million under GDPR for a data breach of one of its subsidiaries, Starwood Hotels. ...
    AMCA multi-party cyber breach

    Multi-Party Incidents in the Headlines

    In May of 2019, the American Medical Collection Agency (AMCA) disclosed a breach of its systems that compromised the personal information of over 24 million individuals. Most of the individuals ...

    From Ideas in the Basement to Successful Enterprise – It Takes Great People

    By: Kelly White, Founder and CEO, RiskRecon It is true. I invented the technology that grew to become ...

    Digital Transformation and the Risk of Costly Cyber Ripples

    Layered software integrations, open APIs, and mutually beneficial data sharing between different businesses are hallmarks of digital transformation today. These technologies and practices serve as ...

    Securing Critical Infrastructure with the NIS Directive

    Every organization faces information security threats. While most organizations are concerned with preventing data breaches, critical infrastructure operators face a much different threat ...

    What is Third-Party SecOps?

    Organizations like NIST and ISO have put together structures to build effective enterprise security programs. Why should third-party risk management be any different?