Vendor Risk Management Insights

      iconemail-box

      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      Security-Assessments-250

      The 3 Weakest Risk Models to Avoid for TPRM (and Why They Don't Work)

      Effective risk modeling plays a huge role in the successful development of a third-party risk management program (TPRM). And a big part of that is deciding which data inputs will comprise the ...
      CDM-Award-250x177

      RiskRecon 2021 Global InfoSec Award Winner - Next-Gen Security Ratings

      RiskRecon, a Mastercard Company is proud to announce that we the 2021 Global InfoSec Award winner for Next-Gen Security Ratings, as named Cyber Defense Magazine (CDM), the industry’s leading ...

      RiskRecon Adds Supply Chain Visibility to its Platform

      The challenges of gaining visibility into supply chain risk have been dramatically highlighted over the last year as many in the security community were left ...
      Evolution-of-Risk-250

      The Evolution Of TPRM - Where Do We Go From Here?

      The Third-Party Risk Management landscape has changed dramatically over the last decade. The 2008 financial collapse illustrated that even our strongest industries and institutions were at risk. ...
      Uncertainty-Report-Thumb-250

      What is the value of better data in third-party risk assessments?

      A good model for predicting third-party risk is only as good as the data you feed it. To help organizations choose the best data to power their third-party risk ...
      Security-Questionnaires-250

      5 Ways to Integrate Continuous Monitoring with Security Questionnaires

      Cybersecurity and risk professionals have long understood the weaknesses of security questionnaires that prevent them from being an accurate barometer of ...
      Correlation-of-IoT-Devices-April-2021-250

      Correlation of IoT Findings With Other Problems

      In this blog, we wrap up our series on IoT device findings.  We invite you to download the full study here!
      TPRM-Hurdles-250

      The Biggest Hurdle in Progressing TPRM Maturity

      As security organizations try to progress and perfect their practices around third-party risk management (TPRM), most follow a predictable path toward maturity. It typically starts with a ...
      iot-85-percent-250x177

      Types of Exposed Enterprise IoT Devices

      Knowing the prevalence of IoT devices and where they are most likely to be found is a good place to start as we continue to examine
      IoT-Total-Number-of-Hosts-250x177

      Prevalence of Exposed Enterprise IoT Devices

      Despite 100s of millions of discoverable IoT devices on the Internet, during our recent research study on exposed IoT ...