Vendor Risk Management Insights


      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.


      The Ripple Data Set

      For the second time in a row, we used Advisen’s Cyber Loss Database to uncover the scope of multi-party incidents since 2008. Containing over 103,000 cyber events ...

      RiskRecon Wins 2021 Enterprise Risk Management Software of the Year

      RiskRecon, a Mastercard Company is proud to announce that we have been selected as the winner of the “Enterprise Risk Management ...

      Defining Ripple Events

      In today’s technology-led business climate, organizations don’t just share information rampantly across company lines— they also ...
      Untitled design (13) copy

      CISA’s Top Routinely Exploited Vulnerabilities

      As evidenced by the continuous flow of news headlines detailing new victims and real-world consequences, the trend of cyber vulnerabilities being exploited is only ...

      New Research Compares Multi-Party Data Breaches to Single Party Events

      Data breaches and security exposures are ...
      RiskRecon Sept 2021 Product Update

      RiskRecon Enhances Platform with New Reporting Capabilities

      In a continued effort to drive innovation and meet the growing needs of today’s businesses, RiskRecon has announced enhancements to the ...

      RiskRecon's View into the Kaseya Attack

      In early July software provider, Kaseya announced it had been the victim of a ransomware attack by the infamous Russian-based hacking group, REvil.  While the ...

      Bringing Clarity to Uncertainty

      With enterprises critically dependent on such large and complex supply chains, traditional methods of managing third-party risk simply do not provide the timely, ...

      Predicting Cyber Risk Posture - Part 2

      In part two of our blog series on predicting cyber risk posture, we dive into more advanced models of third-party risk assessments to ...

      Predicting Cyber Risk Posture - Part 1

      In this blog post, we will discuss how we are seeking to predict third-party cyber risk posture from our recent research report,