Vendor Risk Management Insights

      iconemail-box

      Subscribe to our newsletter

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon newsletter.

      all-bong-98724-unsplash (1)

      RiskRecon Partners with RSA Archer

      We’re excited to announce RiskRecon’s new partnership with
      glenn-carstens-peters-190592-unsplash

      6 Tips for Administering Better Vendor Questionnaires

      Vendor questionnaires are a vital part of determining the cyber risk of your third- and fourth-party vendors, but they also are risky propositions in and of ...
      blair-fraser-307933-unsplash

      SC Magazine Unveils RiskRecon Review

      As vendor risk management becomes a more clear and present danger, the challenge for mitigating vendor risk is twofold:
      markus-spiske-772329-unsplash (1)

      How to protect yourself through the hazards of the M&A process

      The mergers and acquisitions process is scary enough, but absorbing another company’s digital assets without full visibility into their entire digital ...
      mike-tinnion-327565-unsplash

      2019 Cybersecurity Predictions

      VMblog.com, Virtualization Technology News and Information, recently posted some thought-provoking 2019 cybersecurity predictions from industry veteran Kelly White, ...
      campaign-creators-1166997-unsplash

      Product Enhancement: Vendor Information Header Update

      RiskRecon is pleased to announce an update to the header of the vendor assessment tool. The header now provides persistent visibility to the internal references and ...
      kaleidico-754517-unsplash (1)

      Product Enhancement:  Issue Risk Matrix for your Entire Vendor Portfolio

      RiskRecon is pleased to announce the release of the Portfolio Issue Priority Matrix. The Portfolio Issue Risk Matrix provides you instant visibility into the risk ...
      7_deadly_sins

      Seventh Deadly Sin: Limiting vendor risk management to periodic assessments

        We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the last deadly sin, which is limiting ...
      Sin6

      Sixth Deadly Sin: Trusting, but not verifying

        We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management,” here’s the sixth deadly sin, which is trusting ...
      Sin5

      Fifth Deadly Sin: Not knowing your vendors

        We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the fifth deadly sin, which is not knowing ...