Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    SecurityQuestionnaires

    The Problem with Security Questionnaires

    Security questionnaires are one of the most prevalent and recognizable tools used to gauge and manage risks in third-party IT environments. Unfortunately, the popularity of questionnaires is more ...
    HealthcareRiskSurfaceReport-250x177

    How to Overcome Digital Risk in Healthcare

    As we wrap up our blog series on the digital risk surface of healthcare firms, it is important to note that this study was not only ...
    Healthcare-Supply-Chain-Blog-250

    Risk Surface of the Healthcare Supply Chain

    While the types of organizations covered in a previous post officially fall under the Healthcare ...
    HSR-Subsectors250

    Risk Surface of Healthcare Subsectors

    As we continue to look at the digital risk surface of healthcare firms, it is important to note that this study was not only created to be a source of information for gaps in cybersecurity ...
    HSR-Cloud-Hosts-listing

    Security Exposures in Healthcare Cloud Deployments

    Recently we teamed up with the Cyentia Institute to examine the current ...
    HRSHosts250

    Dimensions of the Healthcare Sector Cyber Risk Surface

    Recently we teamed up with the Cyentia Institute to examine the current state of ...
    Rating-Model-Blog-Conclusion

    New RiskRecon Cybersecurity Risk Ratings Model: The Methodology Part 2

    In October 2020, we will be releasing an update to our

    How secure is a Microsoft 365 enterprise deployment?

    The short answer to the question - how secure is a Microsoft 365 enterprise deployment? - is not very secure. Similarly to a lot of cloud hosting providers, Microsoft 365 lacks out-of-the-box ...

    New RiskRecon Cybersecurity Risk Ratings Model: The Methodology Part 1

    In October 2020, we will be releasing an update to our

    Unsafe Network Services: A View on Risk Priorities

    Continuing to explore the key findings from our latest research report,