Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      Security-Questionnaires-250

      5 Ways to Integrate Continuous Monitoring with Security Questionnaires

      Cybersecurity and risk professionals have long understood the weaknesses of security questionnaires that prevent them from being ...
      Correlation-of-IoT-Devices-April-2021-250

      Correlation of IoT Findings With Other Problems

      In this blog, we wrap up our series on IoT device findings.  We invite you to download the ...
      TPRM-Hurdles-250

      The Biggest Hurdle in Progressing TPRM Maturity

      As security organizations try to progress and perfect their practices around third-party risk management (TPRM), most follow a predictable path toward maturity. It ...
      iot-85-percent-250x177

      Types of Exposed Enterprise IoT Devices

      Knowing the prevalence of IoT devices and where they are most likely to be found is a good place to start as we continue to ...
      IoT-Total-Number-of-Hosts-250x177

      Prevalence of Exposed Enterprise IoT Devices

      Despite 100s of millions of discoverable IoT devices on the Internet, during our recent research ...
      Board-Conversations-250x177

      SolarWinds Shows We're Having the Wrong Board-Level Risk Conversations

      It's already been a couple of months since the bombshell of the SolarWinds supply chain attack came to light and it's becoming ...
      IoT-Exposures-250x177

      IoT Devices Are Exposing Firms to the Internet

      Less than a decade after the establishment of the TCP/IP protocol, enterprising engineers at Carnegie Mellon decided it was a good idea to give ...
      Pandemic-Side-Effect-250x177

      A pandemic side effect? More cyberthreats in health care.

      In the middle of a pandemic, the last thing any hospital wants to do is make life even more complicated for its staff and patients. But that’s exactly what ...
      Supply-Chain-Cybsec-250x177

      The Blurring Lines Between Third- and Nth-Party Risk

      As the cybersecurity industry continues to parse the news, threat intelligence, and mounting fallout from the SolarWinds ...
      RR-and-Privva-2

      Privva and RiskRecon Offer Comprehensive Vendor Risk System

      As part of Privva’s phase two integration of RiskRecon, Privva has incorporated RiskRecon data into the scoresheet allowing clients to ...