Panorays’ Blog

Breaches, Vulnerabilities & Incident Response

Learn about the latest research and happenings in TPCRM
Third Party Data Breaches

Third-Party Data Breaches in 2023: The Main Takeaways

An increasing number of leading brands, including T-Mobile, have made headlines over…
Attack Surface Management vs. Vulnerability Management

Attack Surface Management vs. Vulnerability Management

Third-party breaches from high-profile companies such as T-Mobile, Kaseya and SolarWinds have…
What is Data Leakage

The Dangers of Data Leakage: How to Keep…

In August, instant messaging service Discord announced that it had suffered a…
Common Vulnerabilities and Exposures

What is a CVE and How Does It…

There are currently 212,492 vulnerabilities identified, categorized and publicly cataloged in the national vulnerability…
Data Leak Prevention

Why You Should Implement Data Leak Prevention

According to studies from SharkSurfer, 41.6 million accounts were breached in the…
Attack Surface Monitoring

How Attack Surface Monitoring Reduces Third-Party Risk

The recent MoveIT transfer file data breach once again demonstrated the impact…
Known Exploited Vulnerabilities (KEV)

What You Need to Know About Known Exploited…

In 2022, the number of Known Exploited Vulnerabilities more than doubled by…
Attack Vector

What Do Attackers Look for in an Attack…

During the holiday season of 2013, high-level managers at Target were horrified…
The GoDaddy Breach

The GoDaddy Breach: What We Know Now

On February 17th, 2023, one of the world’s largest domain registrars, and…
Network Security Assessment

What Is a Network Security Assessment and Why…

The 38% increase in cyberattacks in 2022, according to the 2023 Security…
Cyber Security Monitoring

What is Cyber Security Monitoring?

Cyber security monitoring is the process of continuously monitoring IT infrastructure to…
Third-party data breaches

The 4 Most Notable Third-Party Data Breaches of…

2022 was an eventful year in the world of third-party cybersecurity. In…
Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
Responding to the Log4Shell Vulnerability

Responding to the Log4Shell Vulnerability

By now, you've probably heard about the Log4Shell vulnerability. This post will…
Third-Party Data Breaches

The 5 Most Notable Third-Party Data Breaches of…

Only half the year is over, but we’ve already experienced some of…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely