The 3 Lifecycle Stages of Vendor Security Risk Management: Onboarding

The 3 Lifecycle Stages of Vendor Security Risk Management: Onboarding

Michael Rasmussen | Sep 10, 2019
This is the first of a three-part series on vendor risk management through the lifecycle of the relationship. Today, we ...
Top 5 Ways to Minimize the Risk of Third-Party Breaches

Top 5 Ways to Minimize the Risk of Third-Party Breaches

Yaffa Klugerman | Aug 7, 2019
Third-party breaches are on the rise. According to a recent report by the Ponemon Institute, over 60% of US companies ex...
The 5 Most Notable Third-Party Data Breaches of 2019 (So Far)

The 5 Most Notable Third-Party Data Breaches of 2019 (So Far)

Yaffa Klugerman | Jul 30, 2019
It’s only mid-2019, but we’ve already experienced a significant amount of third-party breaches, and the number is only i...
Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Yaffa Klugerman | Jul 18, 2019
Customers Now Rely on Panorays to Reduce the Time Spent on Standardized Information Gathering (SIG) Responses
What is SIG?

What is SIG?

Dov Goldman | Jul 16, 2019
The SIG, short for "Standardized Information Gathering (Questionnaire)" is a repository of third-party information secur...
Expert Advice: How to Avoid Misconfigured Servers

Expert Advice: How to Avoid Misconfigured Servers

Yaffa Klugerman | Jul 2, 2019
Lately, we’ve seen a lot of news reports about databases inadvertently being exposed on the internet as a result of serv...
Panorays Unveils New Tools for Auto Discovery of Third and Nth Parties and Geolocation of Digital Assets

Panorays Unveils New Tools for Auto Discovery of Third and Nth Parties and Geolocation of Digital Assets

Yaffa Klugerman | Jun 18, 2019
One Click Automatically Displays Corporate Assets of Third-Party Vendors
Fourth-Party Security: Another Level of Security Management

Fourth-Party Security: Another Level of Security Management

Giora Omer | Jun 18, 2019
How secure are your third-party suppliers? And what about their suppliers? Panorays is focused on third-party security m...
1 2 3 4 5