We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Dov Goldman

Learn about the latest research and happenings in TPSRM
Dov Goldman - VP of Risk Strategy @ Panorays
Dov Goldman
VP of Risk Strategy @ Panorays
Dov is a serial entrepreneur who’s been involved with third-party programs of all sizes, and is the go-to person for explaining the difference between inherent and residual risk.
What is HECVAT - Higher Education Community Vendor Assessment Toolkit

What is HECVAT? Vendor Assessment in Higher Education

HECVAT, also known as the Higher Education Community Vendor Assessment Toolkit, is a security questionnaire template whose…
NIST Cybersecurity Framework

The NIST Cybersecurity Framework (CSF) and TPRM

With the increasing use of artificial intelligence (AI), emphasis on cloud-first strategies and rising reliance on third-party services and technologies, organizations must have a defense plan…
Digital Supply Chain Blind Spots

Uncovering Blind Spots in Your Digital Supply Chain

Although data breach announcements that impact an entire digital supply chain often appear in the headlines, it seems to be difficult to understand how they originally…
Why TPRM is Important

Why TPRM is Critically Important in 2024

According to Deloitte, last year 62% of global leaders identified cyber information…
Third Party Data Breaches

Third-Party Data Breaches in 2023: The Main Takeaways

Increasing numbers leading brands this past year such as T-Mobile appearing in…
Monitoring Vendor Cyber Risk Management

The 6 Most Important Vendor Risk Management Reports

"You can’t manage what you can’t measure," Peter Drucker, the father of…
Digital Supply Chain

Digital Supply Chain Risk Trends in 2023: A…

Forrester data reveals that 55% of security pros reported their organization experienced…
Third-Party Risk Management

Third-Party Risk Management: The Essentials

Third-party risk management (TPRM) entails the assessment and control of risks resulting…
AI In Risk Management

AI in Risk Management: Focusing on Third-Party Risk

According to SkyQuest Global research, only 39% of organizations today are using…
What is a Cyber Risk

Mitigating Third-Party Cyber Risk: A Strategic Approach

Recent surveys report that while 37% of organizations feel they are highly…
Cyber Threat Intelligence

Cyber Threat Intelligence: Defending Third-Party Risk

In 2021, the managed service provider (MSP) Kasaye suffered a massive ransomware…
Cybersecurity Questionnaires

The Role of Due Diligence Questionnaires in Business

Almost a quarter (19%) of data breaches last year occurred due to…
Threat Intelligence Tools

How Threat Intelligence Tools Defend Against Third-Party Risk

On April 30, data from pilots of American Airlines Group Inc. and…
What is Data Leakage

The Dangers of Data Leakage: How to Keep…

In August, instant messaging service Discord announced that it had suffered a…
Vendor Risk Management

How Vendor Risk Management Reduces Third-Party Risk

Businesses are becoming increasingly reliant on third parties for critical systems. As…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely