Vendor Risk Management Insights


      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.


      What the Ascension Breach Means for You

      We’re well-versed in security breaches by now, but there’s still some uncertainty about whom to blame when things go wrong. A solid example of that is the recent ...
      all-bong-98724-unsplash (1)

      RiskRecon Partners with RSA Archer

      We’re excited to announce RiskRecon’s new partnership with

      6 Tips for Administering Better Vendor Questionnaires

      Vendor questionnaires are a vital part of determining the cyber risk of your third- and fourth-party vendors, but they also are risky propositions in and of ...

      SC Magazine Unveils RiskRecon Review

      As vendor risk management becomes a more clear and present danger, the challenge for mitigating vendor risk is twofold:
      markus-spiske-772329-unsplash (1)

      How to protect yourself through the hazards of the M&A process

      The mergers and acquisitions process is scary enough, but absorbing another company’s digital assets without full visibility into their entire digital ...

      2019 Cybersecurity Predictions, Virtualization Technology News and Information, recently posted some thought-provoking 2019 cybersecurity predictions from industry veteran Kelly White, ...

      Product Enhancement: Vendor Information Header Update

      RiskRecon is pleased to announce an update to the header of the vendor assessment tool. The header now provides persistent visibility to the internal references and ...
      kaleidico-754517-unsplash (1)

      Product Enhancement:  Issue Risk Matrix for your Entire Vendor Portfolio

      RiskRecon is pleased to announce the release of the Portfolio Issue Priority Matrix. The Portfolio Issue Risk Matrix provides you instant visibility into the risk ...

      Seventh Deadly Sin: Limiting vendor risk management to periodic assessments

        We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the last deadly sin, which is limiting ...

      Sixth Deadly Sin: Trusting, but not verifying

        We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management,” here’s the sixth deadly sin, which is trusting ...