
Apr 18, 2022
4 min read
Responding to the GitHub Breach
On April 15th, 2022, GitHub, a ubiquitous software development host owned by Microsoft, suffered a third-party breach. This post will tell you everything you need to know— from how to tell if you’re exposed, to how to respond and try to mitigate your risk exposure. What happened? GitHub provides its customers with code repositories that hold all of their public...

Mar 29, 2022
4 min read
Responding to the Okta Breach
By now, you've probably heard about the Okta breach by the malicious hacker group Lapsus$. Here’s everything you need to know—from how to tell if you’re exposed, to how to respond and try to mitigate your risk exposure. Okta, a leading provider of Authentication Services and Identity and Access Management (IAM) solutions, says it is investigating claims of a data...

Jan 26, 2022
2 min read
6 Key Benefits of Panorays’ Starter Plan
By now, you’ve probably heard about Panorays’ exciting new Starter Plan, So, why all the fuss about a new user plan? We believe that this new plan is a gamechanger for vendor risk management, particularly for those organizations that may not know where to begin. This new offering provides you with a taste of Panorays’ rapid and accurate security ratings—both...

Dec 16, 2021
2 min read
Panorays named in 2021 Gartner® Hype Cycle™ for Cyber and IT Risk…
The COVID-19 pandemic has normalized remote work. According to Gartner, “by 2024, remote workers will represent 30% of all employees worldwide. This change has a significant impact on how IT services are delivered and consumed, as well as on how organizations manage the associated risks.” The Hype Cycle for Cyber and IT Risk Management details methods, processes and tools organizations...
Popular Posts

Feb 10, 2022
1 min read
The Most Common Third-Party Cyber Gaps Revealed
As organizations increasingly rely on third-party vendors to provide essential services, they also become more vulnerable to vendor related cybersecurity risks. A recent study by Forrester found that nearly 60% of companies experienced a data breach due to a third-party vendor in the past year. But what are the most common vendor cyber gaps that organizations should be aware of?...

Aug 26, 2021
3 min read
4 Ways to See if You Are at Risk of a Vendor…
Recent supply chain attacks such as Kaseya, Accellion and SolarWinds have illustrated that when it comes to vendor breaches, it’s not if, but when. While it’s impossible to predict cyberattacks, there are key steps that you can take with your vendors to determine if you might be at risk. Here are 4 key strategies: 1. Monitor security posture It’s important...

Jan 03, 2022
3 min read
5 Resolutions for Reducing Third-Party Cyber Risk in 2022
If there’s one thing we’ve all learned, it’s that supply chain attacks are not going away anytime soon. Last year, we saw major cyber incidents involving Accellion, Kaseya, Codecov and others; next year, there will certainly be more. To help prevent and respond to similar cyber incidents, it’s essential to consider how best to reduce third-party risk. How can this...