Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Ripples-2021-250x177

    Defining Ripple Events

    In today’s technology-led business climate, organizations don’t just share information rampantly across company lines— they also share platforms and technology ...
    Untitled design (13) copy

    CISA’s Top Routinely Exploited Vulnerabilities

    As evidenced by the continuous flow of news headlines detailing new victims and real-world consequences, the trend of cyber vulnerabilities being exploited is only continuing to grow. As a result, ...
    Ripples-2021-250x177

    New Research Compares Multi-Party Data Breaches to Single Party Events

    Data breaches and security exposures are bad enough when they impact one ...
    RiskRecon Sept 2021 Product Update

    RiskRecon Enhances Platform with New Reporting Capabilities

    In a continued effort to drive innovation and meet the growing needs of today’s businesses, RiskRecon has announced enhancements to the platform’s reporting features ...
    Kaseya-Attack-250

    RiskRecon's View into the Kaseya Attack

    In early July software provider, Kaseya announced it had been the victim of a ransomware attack by the infamous Russian-based hacking group, REvil. While the initial scope was hard to ...
    Full-Technnical-Data250

    Bringing Clarity to Uncertainty

    With enterprises critically dependent on such large and complex supply chains, traditional methods of managing third-party risk simply do not provide the timely, accurate information necessary to ...
    partial-technical-importance-250

    Predicting Cyber Risk Posture - Part 2

    In part two of our blog series on predicting cyber risk posture, we dive into more advanced models of third-party risk assessments to determine how valuable a partial ...
    Business-Factors-Uncertainty-250

    Predicting Cyber Risk Posture - Part 1

    In this blog post, we will discuss how we are seeking to predict third-party cyber risk posture from our recent research report,

    RiskRecon Rating Correlation to Ransomware Event Frequency

    Predicting Ransomware Event Frequency with RiskRecon Cybersecurity Ratings and Insights
    Findings-Density-250

    Measuring Cyber Risk Posture

    In a perfect world, third-party risk managers would be able to accurately and continually assess expected losses associated with each vendor in their supply chain. Sadly–that is not our reality. ...