Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      How secure is a Microsoft 365 enterprise deployment?

      The short answer to the question - how secure is a Microsoft 365 enterprise deployment? - is not very secure. Similarly to a lot of cloud hosting providers, ...

      RiskReconer: Eric Blatte – My Work Brother

      Shortly after closing the Mastercard acquisition of RiskRecon, Eric and I were reflecting on our journey. In tying it together, ...

      New RiskRecon Cybersecurity Risk Ratings Model: The Methodology Part 1

      In October 2020, we will be releasing an update to our 

      Unsafe Network Services: A View on Risk Priorities

      Continuing to explore the key findings from our latest research report,
      RiskRecon Cybersecurity Risk Ratings Distribution

      New RiskRecon Cybersecurity Risk Ratings Model: The Approach

      In October 2020, we will be releasing an update to our 

      Assessing Cyber Resilience at the Interos Financial Services Summit

      At a time of tectonic geopolitical shifts, a digital revolution, and economic and public health uncertainty, seemingly distant shocks propagate across entire ...

      New RiskRecon Cybersecurity Risk Rating Model: The Risk Reality

       

      Correlation of Unsafe Network Services With Critical Cyber Risks

      As we continue to explore the key findings from our latest research report, Third-Party ...

      Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program

      In part one of this short blog series we introduced the value the continuous monitoring can bring to a third-party risk management program and how you can start to ...

      Unsafe Network Services Exposures Across Industries and the World

      In early September we released a new research report with