We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Giora Omer

Learn about the latest research and happenings in TPSRM
Giora Omer
Giora Omer
Chief Architect @ Panorays
Chief Architect and winner of the annual office basketball competition at Panorays. He has over 20 years experience in software, platform and security engineering.
Fourth party security risk

Why Should You Evaluate Fourth-Party Risk?

Although 80% of organizations have now prioritized third-party risk management, almost half (43%) of respondents from a…
5 Important Statistics About Third-Party Cloud Security

5 Important Statistics About Third-Party Cloud Security

If your organization is like most, it depends on vendors, suppliers and business partners to help get work done. But when these often-less-secure third parties connect…
Addressing 2020’s Most Common Third-Party Cyber Gaps

Addressing the Most Common Third-Party Cyber Gaps

You want to work with vendors, but doing so can involve risk. Which vendor cyber gaps are the most common, and how can they be remediated?…
Protecting Yourself From Third-Party Cloud Vulnerabilities

Protecting Yourself From Third-Party Cloud Vulnerabilities

In our January 2021 version release, Panorays introduced a new Cloud category…
The New Cyber Risk Rating: A Conversation with Panorays’ Chief Architect

The New Cyber Risk Rating: A Conversation with…

Today, Panorays announced its release of the Cyber Risk Rating, a combined…
The Top 5 Third-Party Data Breaches of 2020

The Top 5 Third-Party Data Breaches of 2020

The year is not even half over, and third-party data breaches continue…
Tips for Your Vendor Security: Closing the Most Common Cyber Gaps

Tips for Your Vendor Security: Closing the Most…

Your vendors probably have cyber gaps. Which are the most common, and…
Human Element

Employee Attack Likelihood: The Hidden Indicator Nobody Talks…

When ranking the weakest link in an organization’s cybersecurity barriers, many tend…
5 Ways to Improve Your Third Parties’ Cyber Posture

5 Ways to Improve Your Third Parties’ Cyber…

Your company’s cyber posture may be strong, but that doesn’t mean that…
Key

TLS v1.0 Refuses to Die

The TLS v1.0 cryptographic protocol, released in 1999, has various known vulnerabilities…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely