We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Compliance & Regulations

Learn about the latest research and happenings in TPSRM
An Assessment a Day Keeps the Threat Actors Away

An Assessment a Day Keeps the Threat Actors Away

When considering their next target, threat actors consider two things: how challenging the target is, and how…
What is an SBOM and How Does it Help Assess Third-Party Security Risk?

What Is an SBOM and How Does It Help Assess Third-Party Security Risk?

Attackers continue to successfully target third parties, as a way to more easily circumvent an organization’s otherwise robust cybersecurity. In response, regulatory bodies have started to…
7 Steps for Adopting with NCSC’s New Supply Chain Security Guidance

7 Steps for Adopting with NCSC’s New Supply Chain Security Guidance

In response to a rise in supply chain attacks, the UK’s National Cyber Security Centre has released new guidance on supply chain security. The guidance is…
DORA: What Financial Institutions Need to Know

DORA: What Financial Institutions Need to Know

In response to rising frequency and severity of cyberattacks on financial institutions,…
Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
Top 4 Cybersecurity Predictions for 2022

Top 4 Cybersecurity Predictions for 2022

The past two years have certainly taught us to expect the unexpected….
EBA

The Impact of EBA Guidelines on Third-Party Risk…

There are many types of third-party vendors whose activities, as they relate…
What is MAS-TRM?

What is MAS-TRM?

MAS-TRM stands for the Monetary Authority of Singapore-Technology Risk Management guidelines. It…
What the Cybersecurity Executive Order Means for Software Supply Chain Security

What the Cybersecurity Executive Order Means for Software…

Here’s what to expect and what you can do. Recently, President Biden…
Risky Business

Infographic: Doing Business Doesn’t Have to Be Risky

We all rely on third-party vendors to get our work done. Whether…
A hand holding money coming out of a safe

What is SYSC 8 and Mitigating Third-Party Security…

Technological advancements in the financial sector have made life easier for everyone,…
CIA Triad

What is the CIA Triad and How Can…

When most people hear the three letters CIA in succession, they think…
What Is GLBA & How Do You Ensure Third Party Compliance?

What Is GLBA and How Do You Know…

The Gramm-Leach-Bliley Act (GLBA) is one of the most common regulatory compliance…
Lady Justice

What is OCC and How Does It Affect…

There are many different regulatory groups that oversee finance-related bodies and transactions,…
Statue of Liberty

What is the NY SHIELD Act and How…

In light of concerns over a growing number of cybersecurity threats and…

Featured Authors

The Fastest and
Easiest Way to Securely
Do Business Together