Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    glenn-carstens-peters-190592-unsplash

    6 Tips for Administering Better Vendor Questionnaires

    To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin. Questionnaires ...

    SC Magazine Unveils RiskRecon Review

    As vendor risk management becomes a more clear and present danger, the challenge for mitigating vendor risk is twofold:
    markus-spiske-772329-unsplash (1)

    How to protect yourself through the hazards of the M&A process

    The mergers and acquisitions process is scary enough, but absorbing another company’s digital assets without full visibility into their entire digital infrastructure is downright harrowing. This ...
    mike-tinnion-327565-unsplash

    2019 Cybersecurity Predictions

    VMblog.com, Virtualization Technology News and Information, recently posted some thought-provoking 2019 cybersecurity predictions from industry veteran Kelly White, CEO and Co-Founder of ...
    campaign-creators-1166997-unsplash

    Product Enhancement: Vendor Information Header Update

    RiskRecon is pleased to announce an update to the header of the vendor assessment tool. The header now provides persistent visibility to the internal references and risk categories you have ...
    kaleidico-754517-unsplash (1)

    Product Enhancement:  Issue Risk Matrix for your Entire Vendor Portfolio

    RiskRecon is pleased to announce the release of the Portfolio Issue Priority Matrix. The Portfolio Issue Risk Matrix provides you instant visibility into the risk distribution of security issues ...
    7_deadly_sins

    Seventh Deadly Sin: Limiting vendor risk management to periodic assessments

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the last deadly sin, which is limiting vendor risk management to periodic ...
    Sin6

    Sixth Deadly Sin: Trusting, but not verifying

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management,” here’s the sixth deadly sin, which is trusting but not verifying.
    Sin5

    Fifth Deadly Sin: Not knowing your vendors

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the fifth deadly sin, which is not knowing your vendors.

    Fourth Deadly Sin: Failure to address information security in third-party contracts

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the fourth deadly sin, which is the failure to address information security ...