<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=5551212&amp;fmt=gif">

RiskRecon Reports & White Papers


    Subscribe to our newsletter

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon newsletter.


    The State of the Global Response to the SolarWinds Orion Breach

    In this new white paper, RiskRecon provides a view from the Internet of the SolarWinds Orion breach that has yielded important lessons for managing enterprise cybersecurity risks. In this paper, ...

    New study of exposed IoT Devices in the Enterprise

    Read this new report that looks at how IoT devices affect the risk surface of organizations. This study used RiskRecon’s dataset of millions of hosts ...

    Report: The State of Third-Party Risk Management

    In the spring of 2020, we surveyed over 150 third-party risk practitioners to gain a better understanding of how organizations are operating their

    Report: Internet Risk Surface in the Healthcare Sector

    According to statistics from the U.S. Dept. of Health and Human Services (HHS), 861 breaches of protected health information have been reported over the last 24 months. These numbers don’t exactly ...
    Microsoft 365 Cybersecurity Assessments

    Microsoft 365 Enterprise Security Assessment Toolkit

    This new playbook & ready-to-use questionnaire provides you with the knowledge and resources to objectively assess the security quality of any third-party Microsoft 365 Enterprise ...

    Research Report: Third-Party Security Signals

    In this report, we’ll examine the prevalence of unsafe network services leveraging data from RiskRecon, which conducts scans of internet-facing hosts and the services they’re running. The ...

    White paper: RiskRecon Cybersecurity Risk Rating Model

    RiskRecon is a leading provider of cybersecurity risk ratings. Organizations throughout the world use RiskRecon’s ratings to better understand and act on their cyber risk across a wide range ...

    Continuous Monitoring for Your Third-Party Risk Management Program

    Follow this step-by-step guide to enhance your third-party risk management program with continuous monitoring. Learn how your ...

    Infographic: It's Time to Upgrade to TLS 1.2

    Learn about the key findings from our exclusive research report on the state of TLS 1.2 support.

    Report: The State & Significance of TLS 1.2 Support

    Communicating securely on the web is fundamental to the operation of the Internet. Various TLS (previously SSL) protocols deploy an apparatus of interlocking cryptographic algorithms, ...