Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Security-Assessments-250

    The 3 Weakest Risk Models to Avoid for TPRM (and Why They Don't Work)

    Effective risk modeling plays a huge role in the successful development of a third-party risk management program (TPRM). And a big part of that is deciding which data inputs will comprise the ...
    CDM-Award-250x177

    RiskRecon 2021 Global InfoSec Award Winner - Next-Gen Security Ratings

    RiskRecon, a Mastercard Company is proud to announce that we the 2021 Global InfoSec Award winner for Next-Gen Security Ratings, as named Cyber Defense Magazine (CDM), the industry’s leading ...

    RiskRecon Adds Supply Chain Visibility to its Platform

    The challenges of gaining visibility into supply chain risk have been dramatically highlighted over the last year as many in the security community were left ...
    Evolution-of-Risk-250

    The Evolution Of TPRM - Where Do We Go From Here?

    The Third-Party Risk Management landscape has changed dramatically over the last decade. The 2008 financial collapse illustrated that even our strongest industries and institutions were at risk. ...
    Uncertainty-Report-Thumb-250

    What is the value of better data in third-party risk assessments?

    A good model for predicting third-party risk is only as good as the data you feed it. To help organizations choose the best data to power their third-party risk ...
    Security-Questionnaires-250

    5 Ways to Integrate Continuous Monitoring with Security Questionnaires

    Cybersecurity and risk professionals have long understood the weaknesses of security questionnaires that prevent them from being an accurate barometer of ...
    Correlation-of-IoT-Devices-April-2021-250

    Correlation of IoT Findings With Other Problems

    In this blog, we wrap up our series on IoT device findings. We invite you to download the full study here!
    TPRM-Hurdles-250

    The Biggest Hurdle in Progressing TPRM Maturity

    As security organizations try to progress and perfect their practices around third-party risk management (TPRM), most follow a predictable path toward maturity. It typically starts with a ...
    iot-85-percent-250x177

    Types of Exposed Enterprise IoT Devices

    Knowing the prevalence of IoT devices and where they are most likely to be found is a good place to start as we continue to examine
    IoT-Total-Number-of-Hosts-250x177

    Prevalence of Exposed Enterprise IoT Devices

    Despite 100s of millions of discoverable IoT devices on the Internet, during our recent research study on exposed IoT ...