
May 25, 2021
4 min read
5 Important Statistics About Third-Party Cloud Security
If your organization is like most, it depends on vendors, suppliers and business partners to help get work done. But when these often-less-secure third parties connect to your systems, you effectively increase your organization’s attack surface, thereby making yourself more vulnerable to cyberattacks. This problem is exacerbated when considering cloud assets: Your third parties may be storing your data on...

Apr 27, 2021
3 min read
Addressing the Most Common Third-Party Cyber Gaps
You want to work with vendors, but doing so can involve risk. Which vendor cyber gaps are the most common, and how can they be remediated? To answer these questions, Panorays used data from our cyber posture evaluations of tens of thousands of vendors from numerous industries over long periods of time. We extracted the findings that appeared in a...

Mar 10, 2021
4 min read
Protecting Yourself From Third-Party Cloud Vulnerabilities
In our January 2021 version release, Panorays introduced a new Cloud category to our third-party cyber posture assessments. The Cloud category, as all of our previous categories, is based on non-intrusive probing (e.g. DNS mining) and external data feeds — allowing organizations to assess their third parties easily and quickly. Here’s some background about the significance of this category. Why...

Jul 22, 2020
3 min read
The New Cyber Risk Rating: A Conversation with Panorays’ Chief Architect
Today, Panorays announced its release of the Cyber Risk Rating, a combined “bottom-line” rating of all of the cyber data available about a supplier on Panorays, including the Cyber Posture Rating, Smart Questionnaire™ Rating and business impact. Unique to Panorays, the Cyber Risk Rating enables security professionals to make quick decisions about their suppliers’ security. To shed some light on...

Jun 04, 2020
4 min read
The Top 5 Third-Party Data Breaches of 2020
The year is not even half over, and third-party data breaches continue to proliferate. In third-party data breaches, sensitive information belonging to an organization is compromised through a vendor, business partner or supplier. Such cyber events can be disastrous for organizations, which can lose customer confidence and loyalty and face hefty regulatory penalties. In fact, according to a recent Gartner...

Oct 31, 2019
4 min read
Tips for Your Vendor Security: Closing the Most Common Cyber Gaps
Your vendors probably have cyber gaps. Which are the most common, and how can they be remedied? To answer these questions, Panorays used data from our cyber posture evaluations of tens of thousands of vendors from numerous industries over long periods of time. We extracted the findings that appeared in a large percentage of the companies and omitted obvious low-risk...

Jun 18, 2019
4 min read
Fourth-Party Security: Another Level of Security Management
How secure are your third-party suppliers? And what about their suppliers? Panorays is focused on third-party security management – that is, the security posture of suppliers, vendors, partners and others doing business with an organization. But there’s yet another level that all businesses need to be concerned with – the partners and suppliers of their third parties, which are better...

Mar 26, 2019
5 min read
Employee Attack Likelihood: The Hidden Indicator Nobody Talks About
When ranking the weakest link in an organization’s cybersecurity barriers, many tend to think of unpatched servers, exposed services or even shared resources on cloud providers. However, most overlook the number one factor needed for a successful cyberattack: humans. Different attack vectors, such as phishing and stolen credentials, focus on employees as an initial entry point to a company. The...

Dec 19, 2018
3 min read
The Top 5 Third-Party Cyber Gaps of 2018
As the end of the year approaches, we at Panorays wanted to share what we found to be the top five vendor security cyber gaps in 2018. The Fab Five Panorays has the unique ability to evaluate the cyber posture of a large number of third parties from numerous industries over long periods of time. In our evaluation of over...

Oct 17, 2018
3 min read
5 Ways to Improve Your Third Parties’ Cyber Posture
Your company’s cyber posture may be strong, but that doesn’t mean that you are immune to attackers. As we have seen with recent cyber breaches at British Airways, Ticketmaster and Feedify, hackers typically target companies’ weakest link. Very often that means via a less-secure third party. How can companies improve the cyber posture of their third parties? In honor of...
Popular Posts

Feb 10, 2022
1 min read
The Most Common Third-Party Cyber Gaps Revealed
As organizations increasingly rely on third-party vendors to provide essential services, they also become more vulnerable to vendor related cybersecurity risks. A recent study by Forrester found that nearly 60% of companies experienced a data breach due to a third-party vendor in the past year. But what are the most common vendor cyber gaps that organizations should be aware of?...

Aug 26, 2021
3 min read
4 Ways to See if You Are at Risk of a Vendor…
Recent supply chain attacks such as Kaseya, Accellion and SolarWinds have illustrated that when it comes to vendor breaches, it’s not if, but when. While it’s impossible to predict cyberattacks, there are key steps that you can take with your vendors to determine if you might be at risk. Here are 4 key strategies: 1. Monitor security posture It’s important...

Jan 03, 2022
3 min read
5 Resolutions for Reducing Third-Party Cyber Risk in 2022
If there’s one thing we’ve all learned, it’s that supply chain attacks are not going away anytime soon. Last year, we saw major cyber incidents involving Accellion, Kaseya, Codecov and others; next year, there will certainly be more. To help prevent and respond to similar cyber incidents, it’s essential to consider how best to reduce third-party risk. How can this...