Top 5 Mistakes in Cybersecurity Vendor Management

Top 5 Mistakes in Cybersecurity Vendor Management

Yaffa Klugerman | Jan 16, 2020
Everyone makes mistakes. But when it comes to cybersecurity vendor management, it’s best to avoid them completely. 
4 Key Cybersecurity Predictions for 2020

4 Key Cybersecurity Predictions for 2020

Yaffa Klugerman | Dec 18, 2019
What lies ahead in 2020? We asked Panorays researchers to weigh in on what they see as the key issues that will surface ...
Panorays Raises $15 Million Series A to Accelerate Third-Party Security Management

Panorays Raises $15 Million Series A to Accelerate Third-Party Security Management

Yaffa Klugerman | Dec 4, 2019
The Panorays platform protects against third-party breaches, which affect nearly two-thirds of U.S. organizations 
3 Key Points About CCPA

3 Key Points About CCPA

Yaffa Klugerman | Nov 26, 2019
What is CCPA?   The California Consumer Privacy Act (AB 375), which will go into effect on January 1, 2020, is expected ...
What Drives Our Features: A Conversation with Panorays’ VP Product

What Drives Our Features: A Conversation with Panorays’ VP Product

Yaffa Klugerman | Nov 21, 2019
What does it take to make companies’ third-party security process as efficient and effective as possible? We spoke with ...
Tips for Your Vendor Security: Complying With Regulations

Tips for Your Vendor Security: Complying With Regulations

Yaffa Klugerman | Oct 24, 2019
Organizations have much more than just data to lose in a third-party breach. Besides losing consumer confidence and loya...
Tips for Your Vendor Security: Building the Right Password Policy

Tips for Your Vendor Security: Building the Right Password Policy

Yaffa Klugerman | Oct 17, 2019
Organizations still rely on passwords to ensure security, and so having secure passwords has never been more important. ...
Tips for Your Vendor Security: How to Prevent Phishing Attacks

Tips for Your Vendor Security: How to Prevent Phishing Attacks

Yaffa Klugerman | Oct 8, 2019
Phishing is an attempt to deceive a victim in order to gain access to confidential information and/or distribute infecte...