Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      TEI-Infographic-250

      Forrester: RiskRecon Yields More Efficient Cyber Risk Management

      Women-in-Cybersecurity-June-2021

      RiskRecon: Helping to Strengthen Women in Cybersecurity

      RiskRecon, a Mastercard Company, is proud to once again be working with Ringzer0 Training to help promote the growth of women in cybersecurity roles.  ...
      11575-TEIStudy_A_250x177px

      Forrester TEI Study: Analysts are 150% More Productive With RiskRecon

      Recent Forrester ...
      Nth-Party-Risk-250

      The rise of nth party risk: What you need to know

      For many years, the hacks that made headlines involved vast breaches from a single company — devastating to the people whose data was exposed, but containable ...
      Security-Assessments-250

      The 3 Weakest Risk Models to Avoid for TPRM (and Why They Don't Work)

      Effective risk modeling plays a huge role in the successful development of a third-party risk management program (TPRM). And a big part of that is deciding which ...
      CDM-Award-250x177

      RiskRecon 2021 Global InfoSec Award Winner - Next-Gen Security Ratings

      RiskRecon, a Mastercard Company is proud to announce that we the 2021 Global InfoSec Award winner for Next-Gen Security Ratings, as named Cyber Defense Magazine ...

      RiskRecon Adds Supply Chain Visibility to its Platform

      The challenges of gaining visibility into supply chain risk have been dramatically highlighted over the last year as many in the ...
      Evolution-of-Risk-250

      The Evolution Of TPRM - Where Do We Go From Here?

      The Third-Party Risk Management landscape has changed dramatically over the last decade. The 2008 financial collapse illustrated that even our strongest industries ...
      Uncertainty-Report-Thumb-250

      What is the value of better data in third-party risk assessments?

      A good model for predicting third-party risk is only as good as the data you feed it. To help organizations choose the best data to ...
      Security-Questionnaires-250

      5 Ways to Integrate Continuous Monitoring with Security Questionnaires

      Cybersecurity and risk professionals have long understood the weaknesses of security questionnaires that prevent them from being ...