Vendor Risk Management Insights


      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.


      Predicting Cyber Risk Posture - Part 2

      In part two of our blog series on predicting cyber risk posture, we dive into more advanced models of third-party risk assessments to determine how valuable a partial ...

      Predicting Cyber Risk Posture - Part 1

      In this blog post, we will discuss how we are seeking to predict third-party cyber risk posture from our recent research report,

      RiskRecon Rating Correlation to Ransomware Event Frequency

      Predicting Ransomware Event Frequency with RiskRecon Cybersecurity Ratings and Insights

      Measuring Cyber Risk Posture

      In a perfect world, third-party risk managers would be able to accurately and continually assess expected losses associated with each vendor in their supply chain. Sadly–that is not our reality. ...
      Best risk models for security assessments

      Context is Everything in Third-Party Risk Modeling

      Vetting new vendors for cyber risk and working with existing vendors to improve their security practices can be a tall order for any third-party risk management (TPRM) program. But it can be near ...

      Forrester: RiskRecon Solves Key Third-Party Risk Management Challenges

      Demand for RiskRecon’s cyber risk ratings and insights continues to grow as the number of cyberattacks connected to third-party risk rises. A recent

      Forrester: RiskRecon Yields More Efficient Cyber Risk Management

      In ...

      RiskRecon: Helping to Strengthen Women in Cybersecurity

      RiskRecon, a Mastercard Company, is proud to once again be working with Ringzer0 Training to help promote the growth of women in cybersecurity roles. 

      Forrester TEI Study: Analysts are 150% More Productive With RiskRecon

      Recent Forrester Research Affirms RiskRecon’s ...

      The rise of nth party risk: What you need to know

      For many years, the hacks that made headlines involved vast breaches from a single company — devastating to the people whose data was exposed, but containable events. Those are fast becoming ...