Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      RiskRecon Cybersecurity Risk Ratings Distribution

      New RiskRecon Cybersecurity Risk Ratings Model: The Approach

      In October 2020, we will be releasing an update to our 

      Assessing Cyber Resilience at the Interos Financial Services Summit

      At a time of tectonic geopolitical shifts, a digital revolution, and economic and public health uncertainty, seemingly distant shocks propagate across entire ...

      New RiskRecon Cybersecurity Risk Rating Model: The Risk Reality

       

      Correlation of Unsafe Network Services With Critical Cyber Risks

      As we continue to explore the key findings from our latest research report, Third-Party ...

      Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program

      In part one of this short blog series we introduced the value the continuous monitoring can bring to a third-party risk management program and how you can start to ...

      Unsafe Network Services Exposures Across Industries and the World

      In early September we released a new research report with

      Prevalence of Unsafe Services

      You might wonder just how widespread the problem of unsafe services is. “Unsafe” ...
      AdobeStock_141587175 (1)

      Part 1:  Incorporating Continuous Monitoring into Your Third-Party Risk Program

      Continuous monitoring is a valuable tool for organizations seeking to improve ...

      When TLS Problems Signal Broader Security Hygiene Flaws

      As organizations examine their vendor relationships with an eye toward cyber risk, there's rarely a single factor that would tell a decision-maker that any given ...

      The TLS 1.2 Deadline is Looming, Do You Have Your Act Together?

      In the pantheon of security configuration duties for organizations running internet assets, maintaining the latest TLS encryption protocols to keep the ...