The 3 Lifecycle Stages of Vendor Security Risk Management: Ongoing Monitoring

The 3 Lifecycle Stages of Vendor Security Risk Management: Ongoing Monitoring

Michael Rasmussen | Sep 16, 2019
Ongoing Security Monitoring has Become a Must Too often organizations conduct security due diligence when onboarding a t...
Panorays and SANS Collaborate on Whitepaper and Webcast

Panorays and SANS Collaborate on Whitepaper and Webcast

Yaffa Klugerman | Sep 11, 2019
Panorays has collaborated with the SANS Institute to produce "Success Patterns for Supply Chain Security,” a whitepaper ...
The 3 Lifecycle Stages of Vendor Security Risk Management: Onboarding

The 3 Lifecycle Stages of Vendor Security Risk Management: Onboarding

Michael Rasmussen | Sep 10, 2019
This is the first of a three-part series on vendor risk management through the lifecycle of the relationship. Today, we ...
Top 5 Ways to Minimize the Risk of Third-Party Breaches

Top 5 Ways to Minimize the Risk of Third-Party Breaches

Yaffa Klugerman | Aug 7, 2019
Third-party breaches are on the rise. According to a recent report by the Ponemon Institute, over 60% of US companies ex...
The 5 Most Notable Third-Party Data Breaches of 2019 (So Far)

The 5 Most Notable Third-Party Data Breaches of 2019 (So Far)

Yaffa Klugerman | Jul 30, 2019
It’s only mid-2019, but we’ve already experienced a significant amount of third-party breaches, and the number is only i...
Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Yaffa Klugerman | Jul 18, 2019
Customers Now Rely on Panorays to Reduce the Time Spent on Standardized Information Gathering (SIG) Responses
What is SIG?

What is SIG?

Dov Goldman | Jul 16, 2019
The SIG, short for "Standardized Information Gathering (Questionnaire)" is a repository of third-party information secur...
Expert Advice: How to Avoid Misconfigured Servers

Expert Advice: How to Avoid Misconfigured Servers

Yaffa Klugerman | Jul 2, 2019
Lately, we’ve seen a lot of news reports about databases inadvertently being exposed on the internet as a result of serv...
1 2 3 4 5