Vendor Risk Management Insights


      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.


      The 3 Weakest Risk Models to Avoid for TPRM (and Why They Don't Work)

      Effective risk modeling plays a huge role in the successful development of a third-party risk management program (TPRM). And a big part of that is deciding which data inputs will comprise the ...

      RiskRecon 2021 Global InfoSec Award Winner - Next-Gen Security Ratings

      RiskRecon, a Mastercard Company is proud to announce that we the 2021 Global InfoSec Award winner for Next-Gen Security Ratings, as named Cyber Defense Magazine (CDM), the industry’s leading ...

      RiskRecon Adds Supply Chain Visibility to its Platform

      The challenges of gaining visibility into supply chain risk have been dramatically highlighted over the last year as many in the security community were left ...

      The Evolution Of TPRM - Where Do We Go From Here?

      The Third-Party Risk Management landscape has changed dramatically over the last decade. The 2008 financial collapse illustrated that even our strongest industries and institutions were at risk. ...

      What is the value of better data in third-party risk assessments?

      A good model for predicting third-party risk is only as good as the data you feed it. To help organizations choose the best data to power their third-party risk ...

      5 Ways to Integrate Continuous Monitoring with Security Questionnaires

      Cybersecurity and risk professionals have long understood the weaknesses of security questionnaires that prevent them from being an accurate barometer of ...

      Correlation of IoT Findings With Other Problems

      In this blog, we wrap up our series on IoT device findings.  We invite you to download the full study here!

      The Biggest Hurdle in Progressing TPRM Maturity

      As security organizations try to progress and perfect their practices around third-party risk management (TPRM), most follow a predictable path toward maturity. It typically starts with a ...

      Types of Exposed Enterprise IoT Devices

      Knowing the prevalence of IoT devices and where they are most likely to be found is a good place to start as we continue to examine

      Prevalence of Exposed Enterprise IoT Devices

      Despite 100s of millions of discoverable IoT devices on the Internet, during our recent research study on exposed IoT ...