Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Goldilocks1

    How the Goldilocks Zone Impacts Multi-Cloud Risk

    Now that almost all organizations have at least established some kind of foothold in the cloud, the real growth begins. Cloud adoption rates keep ticking upward as organizations push more ...
    California-Consumer-Privacy-Act-of-2018-03-1800x1049

    CCPA Foundations Part II

    In Part II of our series on CCPA Foundations, we will explore Enforcements & Fines associated with this new legislation.
    ccpa

    CCPA Foundations Part I

    The right to privacy is regarded around the world as a fundamental human right. In fact, the UN’s Universal Declaration of Human Rights states that “No one shall be subjected to arbitrary ...
    Measuring cybersecurity risk

    Measuring Risk Surface: Part 1

    A primer on the objects of our measurement
    steinar-engeland-128831-unsplash

    What the Ascension Breach Means for You

    We’re well-versed in security breaches by now, but there’s still some uncertainty about whom to blame when things go wrong. A solid example of that is the recent Ascension Breach that involved ...
    all-bong-98724-unsplash (1)

    RiskRecon Partners with RSA Archer

    We’re excited to announce RiskRecon’s new partnership with RSA Archer. RSA Archer was ...
    glenn-carstens-peters-190592-unsplash

    6 Tips for Administering Better Vendor Questionnaires

    To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin. Questionnaires ...
    blair-fraser-307933-unsplash

    SC Magazine Unveils RiskRecon Review

    As vendor risk management becomes a more clear and present danger, the challenge for mitigating vendor risk is twofold:
    markus-spiske-772329-unsplash (1)

    How to protect yourself through the hazards of the M&A process

    The mergers and acquisitions process is scary enough, but absorbing another company’s digital assets without full visibility into their entire digital infrastructure is downright harrowing. This ...
    mike-tinnion-327565-unsplash

    2019 Cybersecurity Predictions

    VMblog.com, Virtualization Technology News and Information, recently posted some thought-provoking 2019 cybersecurity predictions from industry veteran Kelly White, CEO and Co-Founder of ...