We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Breaches, Vulnerabilities & Incident Response

Learn about the latest research and happenings in TPCRM
Third-Party Cloud Security

What is CSPM? A Guide to Cloud Security Posture Management

Once upon a time, most businesses hosted all their critical infrastructure on their own servers. But then…
What is an Attack Vector?

What is an Attack Vector?

To anyone concerned with cybersecurity, understanding attack vectors is crucial. An attack vector is the path or entry point that an attacker uses to gain unauthorized…
Broken chain

The CrowdStrike Supply Chain Incident: A Lesson in Third-Party Risk Management

On Friday, July 19th, Windows workstations and servers worldwide started displaying the 'Blue Screen of Death' (BSOD error), causing them to shut down and disrupt services….
Preventing phishing attacks

Preventing Phishing Attacks: Cybersecurity Best Practices

Cybersecurity requires organizations to spot and respond to an array of threats,…
2024 BoA Data Breach

The Bank of America 2024 Data Breach and…

On February 13th, Bank of America announced a data breach exposing the…
Third Party Data Breaches

Third-Party Data Breaches in 2023: The Main Takeaways

An increasing number of leading brands, including T-Mobile, have made headlines over…
Attack Surface Management vs. Vulnerability Management

Attack Surface Management vs. Vulnerability Management

Third-party breaches from high-profile companies such as T-Mobile, Kaseya and SolarWinds have…
What is Data Leakage

The Dangers of Data Leakage: How to Keep…

In August, instant messaging service Discord announced that it had suffered a…
Common Vulnerabilities and Exposures

What is a CVE and How Does It…

There are currently 212,492 vulnerabilities identified, categorized and publicly cataloged in the national vulnerability…
Data Leak Prevention

Why You Should Implement Data Leak Prevention

According to studies from SharkSurfer, 41.6 million accounts were breached in the…
Attack Surface Monitoring

How Attack Surface Monitoring Reduces Third-Party Risk

The recent MoveIT transfer file data breach once again demonstrated the impact…
Known Exploited Vulnerabilities (KEV)

What You Need to Know About Known Exploited…

In 2022, the number of Known Exploited Vulnerabilities more than doubled by…
Attack Vector

What Do Attackers Look for in an Attack…

During the holiday season of 2013, high-level managers at Target were horrified…
Remediation vs Mitigation

Remediation vs. Mitigation: What’s the Difference?

Vulnerability management is tough. With more than half of organizations (66%) having…
The GoDaddy Breach

The GoDaddy Breach: What We Know Now

On February 17th, 2023, one of the world’s largest domain registrars, and…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely