Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program

    In part one of this short blog series we introduced the value the continuous monitoring can bring to a third-party risk management program and how you can start to introduce it into your practice. ...
    AdobeStock_141587175 (1)

    Part 1:  Incorporating Continuous Monitoring into Your Third-Party Risk Program

    Continuous monitoring is a valuable tool for organizations seeking to improve their cyber third-party risk ...

    RiskRecon is Acquired by Mastercard to Enhance Cyber Threat Intelligence

    Mastercard has announced the acquisition of RiskRecon to bolster its cyber threat intelligence portfolio.
    AdobeStock_191206319

    RiskRecon Announces the Invention of Ground-Breaking Asset Risk Valuation Algorithms, Transforming How Enterprises Manage Third-Party Cyber Risk

    Today RiskRecon announced its ground-breaking asset valuation algorithms that automatically determine the inherent risk value of any Internet-facing system. These ...
    shahadat-shemul-1532385-unsplash

    Why Third-Party Security Risk Matters

    Big Impact Enterprises entrust the protection of their crown jewels—their customer data, their reputation, their finances, and their business availability—with third parties. ...
    jeshoots-com-632498-unsplash

    Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

    Summary The Meltdown and Spectre vulnerabilities represent an ...
    annie-spratt-450567-unsplash

    Principles for Fair and Accurate Security Ratings

    The U.S. Chamber of Commerce just issued “Principles for Fair and Accurate Security ...
    matthew-henry-87142-unsplash

    Extending GRC with Continuous Vendor Security Monitoring

    We speak with many clients that already have some form of governance, risk management, and compliance (GRC) program in place to assist with managing their enterprise programs. And some have ...
    octav-cado-508490-unsplash-1

    When Apache Struts2 Hits the Fan, Respond with Data and Collaboration

    Mitigating your third-party exposure to Apache Struts2 requires accurate, actionable data -- and fast. If you can apply automated techniques to rapidly identify which of your vendors are most ...
    adi-goldstein-1384102-unsplash

    Using Threat Intelligence to Manage Third Party Risk: The Boy Who Cried Wolf

    More and more enterprises are increasing their budgets for threat intelligence in order to stay on top of the latest security risks. The dramatic increase in third party cyber security risk ...