We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Giora Omer

Learn about the latest research and happenings in TPSRM
Giora Omer
Giora Omer
Chief Architect @ Panorays
Chief Architect and winner of the annual office basketball competition at Panorays. He has over 20 years experience in software, platform and security engineering (with a short hiatus for a degree in film).
5 Important Statistics About Third-Party Cloud Security

5 Important Statistics About Third-Party Cloud Security

If your organization is like most, it depends on vendors, suppliers and business partners to help get…
Addressing 2020’s Most Common Third-Party Cyber Gaps

Addressing the Most Common Third-Party Cyber Gaps

You want to work with vendors, but doing so can involve risk. Which vendor cyber gaps are the most common, and how can they be remediated?…
Protecting Yourself From Third-Party Cloud Vulnerabilities

Protecting Yourself From Third-Party Cloud Vulnerabilities

In our January 2021 version release, Panorays introduced a new Cloud category to our third-party cyber posture assessments. The Cloud category, as all of our previous…
The New Cyber Risk Rating: A Conversation with Panorays’ Chief Architect

The New Cyber Risk Rating: A Conversation with…

Today, Panorays announced its release of the Cyber Risk Rating, a combined…
The Top 5 Third-Party Data Breaches of 2020

The Top 5 Third-Party Data Breaches of 2020

The year is not even half over, and third-party data breaches continue…
Tips for Your Vendor Security: Closing the Most Common Cyber Gaps

Tips for Your Vendor Security: Closing the Most…

Your vendors probably have cyber gaps. Which are the most common, and…
Fourth-Party Security: Another Level of Security Management

Fourth-Party Security: Another Level of Security Management

How secure are your third-party suppliers? And what about their suppliers? Panorays…
Human Element

Employee Attack Likelihood: The Hidden Indicator Nobody Talks…

When ranking the weakest link in an organization’s cybersecurity barriers, many tend…
The Top 5 Third-Party Cyber Gaps of 2018

The Top 5 Third-Party Cyber Gaps of 2018

As the end of the year approaches, we at Panorays wanted to…
5 Ways to Improve Your Third Parties’ Cyber Posture

5 Ways to Improve Your Third Parties’ Cyber…

Your company’s cyber posture may be strong, but that doesn’t mean that…
Key

TLS v1.0 Refuses to Die

The TLS v1.0 cryptographic protocol, released in 1999, has various known vulnerabilities…

Featured Authors

The Fastest and
Easiest Way to Securely
Do Business Together