Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Ripples-2021-250x177

    New Research Compares Multi-Party Data Breaches to Single Party Events

    Data breaches and security exposures are bad enough when they impact one ...
    RiskRecon Sept 2021 Product Update

    RiskRecon Enhances Platform with New Reporting Capabilities

    In a continued effort to drive innovation and meet the growing needs of today’s businesses, RiskRecon has announced enhancements to the platform’s reporting features ...
    Kaseya-Attack-250

    RiskRecon's View into the Kaseya Attack

    In early July software provider, Kaseya announced it had been the victim of a ransomware attack by the infamous Russian-based hacking group, REvil. While the initial scope was hard to ...
    Full-Technnical-Data250

    Bringing Clarity to Uncertainty

    With enterprises critically dependent on such large and complex supply chains, traditional methods of managing third-party risk simply do not provide the timely, accurate information necessary to ...
    partial-technical-importance-250

    Predicting Cyber Risk Posture - Part 2

    In part two of our blog series on predicting cyber risk posture, we dive into more advanced models of third-party risk assessments to determine how valuable a partial ...
    Business-Factors-Uncertainty-250

    Predicting Cyber Risk Posture - Part 1

    In this blog post, we will discuss how we are seeking to predict third-party cyber risk posture from our recent research report,

    RiskRecon Rating Correlation to Ransomware Event Frequency

    Predicting Ransomware Event Frequency with RiskRecon Cybersecurity Ratings and Insights
    Findings-Density-250

    Measuring Cyber Risk Posture

    In a perfect world, third-party risk managers would be able to accurately and continually assess expected losses associated with each vendor in their supply chain. Sadly–that is not our reality. ...
    Best risk models for security assessments

    Context is Everything in Third-Party Risk Modeling

    Vetting new vendors for cyber risk and working with existing vendors to improve their security practices can be a tall order for any third-party risk management (TPRM) program. But it can be near ...
    TEI-Use-Cases

    Forrester: RiskRecon Solves Key Third-Party Risk Management Challenges

    Demand for RiskRecon’s cyber risk ratings and insights continues to grow as the number of cyberattacks connected to third-party risk rises. A recent