RiskRecon Reports & White Papers

      iconemail-box

      Subscribe to our newsletter

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon newsletter.

      Research Report: Third-Party Security Signals

      In this report, we’ll examine the prevalence of unsafe network services leveraging data from RiskRecon, which conducts scans of internet-facing hosts and the ...

      White paper: RiskRecon Cybersecurity Risk Rating Model

      RiskRecon is a leading provider of cybersecurity risk ratings. Organizations throughout the world use RiskRecon’s ratings to better understand and act on ...

      Continuous Monitoring for Your Third-Party Risk Management Program

      Follow this step-by-step guide to enhance your third-party risk management program with continuous ...

      Infographic: It's Time to Upgrade to TLS 1.2

      Learn about the key findings from our exclusive research report on the state of TLS 1.2 support.

      Report: The State & Significance of TLS 1.2 Support

      Communicating securely on the web is fundamental to the operation of the Internet. Various TLS (previously SSL) protocols deploy an apparatus of ...

      Case Study: Reducing Cybersecurity Risk in the Finance Sector

      Why are financial institutions turning to RiskRecon to help them reduce their cybersecurity risk? Read our new case study to learn why a fortune 500 ...

      Amazon Web Services Core Assessment Playbook & Questionnaire

      Playbook & Questionnaire Overview

      Infographic: Are we safer on-prem or in the cloud?

      In our new infographic, we examine if organizations are operating more safely in on-premise or cloud environments. Check out the key findings ...

      The Analyst View: State of Cybersecurity Risk Ratings

      Cybersecurity risk ratings are rapidly becoming a critical component of third-party cyber risk management programs. Security leaders are beginning to use ...

      White paper: Why Third-Party Risk Matters

      In this white paper, we detail the need to gain a strong understanding of third-party cyber risks and how your business can be impacted by a lack of ...