Fourth-Party Security: Another Level of Security Management

Fourth-Party Security: Another Level of Security Management

Giora Omer | Jun 18, 2019
How secure are your third-party suppliers? And what about their suppliers? Panorays is focused on third-party security m...
Lane Bess, Security Industry Veteran, Joins Panorays as Advisor and Investor

Lane Bess, Security Industry Veteran, Joins Panorays as Advisor and Investor

Yaffa Klugerman | Jun 7, 2019
Panorays, a rapidly growing provider of automated third-party security management, has announced that Lane Bess, former ...
Happy Birthday, GDPR!

Happy Birthday, GDPR!

Yaffa Klugerman | May 22, 2019
It’s been one year since the General Data Protection Regulation was implemented, and it’s shaken up the way many compani...
3 Reasons Why Enterprises Hate Security Questionnaires

3 Reasons Why Enterprises Hate Security Questionnaires

Yaffa Klugerman | May 8, 2019
It’s not hard to understand why security questionnaires are necessary. Because regulations like GDPR and NYDFS are holdi...
Interview Excerpts: Third-Party Security - Challenges and Solutions

Interview Excerpts: Third-Party Security - Challenges and Solutions

Yaffa Klugerman | Apr 23, 2019
Earlier this month, Panorays CEO and co-founder Matan Or-El spoke about third-party security at the secureCISO event in ...
Security for Subsidiaries: 4 Lessons Learned From the Toyota Breach

Security for Subsidiaries: 4 Lessons Learned From the Toyota Breach

Yaffa Klugerman | Apr 8, 2019
Last week we heard about another massive data breach, this one through automobile maker Toyota, which exposed the inform...
Panorays Debuts Unique “Human Element” Assessment

Panorays Debuts Unique “Human Element” Assessment

Yaffa Klugerman | Mar 26, 2019
New Capabilities Expand on its Automated Third-Party Security Management Platform
Employee Attack Likelihood: The Hidden Indicator Nobody Talks About

Employee Attack Likelihood: The Hidden Indicator Nobody Talks About

Giora Omer | Mar 26, 2019
When ranking the weakest link in an organization’s cybersecurity barriers, many tend to think of unpatched servers, expo...
1 2 3 4 5