Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Uncertainty-Report-Thumb-250

    What is the value of better data in third-party risk assessments?

    A good model for predicting third-party risk is only as good as the data you feed it. To help organizations choose the best data to power their third-party risk ...
    Security-Questionnaires-250

    5 Ways to Integrate Continuous Monitoring with Security Questionnaires

    Cybersecurity and risk professionals have long understood the weaknesses of security questionnaires that prevent them from being an accurate barometer of ...
    Correlation-of-IoT-Devices-April-2021-250

    Correlation of IoT Findings With Other Problems

    In this blog, we wrap up our series on IoT device findings. We invite you to download the full study here!
    TPRM-Hurdles-250

    The Biggest Hurdle in Progressing TPRM Maturity

    As security organizations try to progress and perfect their practices around third-party risk management (TPRM), most follow a predictable path toward maturity. It typically starts with a ...
    iot-85-percent-250x177

    Types of Exposed Enterprise IoT Devices

    Knowing the prevalence of IoT devices and where they are most likely to be found is a good place to start as we continue to examine
    IoT-Total-Number-of-Hosts-250x177

    Prevalence of Exposed Enterprise IoT Devices

    Despite 100s of millions of discoverable IoT devices on the Internet, during our recent research study on exposed IoT ...
    Board-Conversations-250x177

    SolarWinds Shows We're Having the Wrong Board-Level Risk Conversations

    It's already been a couple of months since the bombshell of the SolarWinds supply chain attack came to light and it's becoming increasingly clear that it'll take ...
    IoT-Exposures-250x177

    IoT Devices Are Exposing Firms to the Internet

    Less than a decade after the establishment of the TCP/IP protocol, enterprising engineers at Carnegie Mellon decided it was a good idea to give their local vending machine access ...
    Pandemic-Side-Effect-250x177

    A pandemic side effect? More cyberthreats in health care.

    In the middle of a pandemic, the last thing any hospital wants to do is make life even more complicated for its staff and patients. But that’s exactly what happened in France last month, ...
    Supply-Chain-Cybsec-250x177

    The Blurring Lines Between Third- and Nth-Party Risk

    As the cybersecurity industry continues to parse the news, threat intelligence, and mounting fallout from the SolarWinds compromise, the gory details just keep ...