We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Dov Goldman

Learn about the latest research and happenings in TPSRM
Dov Goldman - VP of Risk Strategy @ Panorays
Dov Goldman
VP of Risk Strategy @ Panorays
Dov is a serial entrepreneur who’s been involved with third-party programs of all sizes, and is the go-to person for explaining the difference between inherent and residual risk.
Cyber Threat Intelligence

Cyber Threat Intelligence: Defending Third-Party Risk

In 2021, the managed service provider (MSP) Kasaye suffered a massive ransomware attack via its VSA remote…
Cybersecurity Questionnaires

The Role of Due Diligence Questionnaires in Business

Almost a quarter (19%) of data breaches last year occurred due to a compromise of a business partner or third party. As reliance on these third…
Threat Intelligence Tools

How Threat Intelligence Tools Defend Against Third-Party Risk

On April 30, data from pilots of American Airlines Group Inc. and Southwest Airlines Co. was exfiltrated, compromising the personally identifiable information (PII) of at least…
What is Data Leakage

The Dangers of Data Leakage: How to Keep…

In August, instant messaging service Discord announced that it had suffered a…
Vendor Risk Management

How Vendor Risk Management Reduces Third-Party Risk

Businesses are becoming increasingly reliant on third parties for critical systems. As…
Digital Supply Chain

Evaluating the Digital Supply Chain for Third-Party Risk

In 2011, an underwater earthquake of 9.0 magnitude struck Japan – one…
Supply chain security

7 Steps to Adopt NCSC’s New Supply Chain…

British Air, the BBC, British pharmaceutical company Boots, and Irish airline Aer…
Information Leakage

Understanding Information Leakage: What You Need to Know

In the midst of the global pandemic when its use was at…
IT Risk Management

IT Risk Management and Securing Your Enterprise

According to IBM's Cost of a Data Breach 2023, two out of…
HIPAA Compliance Audit

Getting Ready for HIPAA Compliance Audit

The HIPAA Audit: What to Know Before You Get the Notice The…
How to implement zero trust

Zero Trust: The Core of Your Third-Party Risk…

“Zero trust” is a security strategy to meet today’s increasingly complex cybersecurity…
Integrated Risk Management

How Integrated Risk Management Works With TPRM

According to CheckPoint, 76% of organizations are concerned about cloud security threats…
Inherent Risk

Inherent Risk: Use it to Evaluate Third-Party Risk

According to Black Kite, 39.7% of third-party breaches in 2022 originated from…
SBOM

How an SBOM Helps Assess Third-Party Security Risk

In 2020, a public company based in Tulsa, Oklahoma that sells software…
GRC Cyber Security

GRC Cyber Security: GRC Tools’ Gap in Third-Party…

Understanding the Power of GRC Cyber Security Functionality Cyber Security is an…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely