We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Compliance & Regulations

Learn about the latest research and happenings in TPCRM
CPRA Regulations

What are the CPRA Regulations Versus the CCPA?

In 2021, Black Kite reported leaks of personal information (PI) from 1.5…
5 Key Security Controls That Should Be in Your SOC 2

5 Key SOC 2 Controls Your Organization Must…

You want to grow your business, but your customers want to be…

What’s NY SHIELD Act and Ensuring Third-Party Compliance

In light of concerns over a growing number of cybersecurity threats and…
Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
EBA Guidelines

The Impact of EBA Guidelines on Third-Party Risk…

There are many types of third-party vendors whose activities, as they relate…
A hand holding money coming out of a safe

What is SYSC 8 and Mitigating Third-Party Security…

Technological advancements in the financial sector have made life easier for everyone,…
What Is GLBA & How Do You Ensure Third Party Compliance?

What Is GLBA and How Do You Know…

The Gramm-Leach-Bliley Act (GLBA) is one of the most common regulatory compliance…
Lady Justice

What is OCC and How Does It Affect…

The Office of the Comptroller of the Currency (OCC) is one of…
What is PCI DSS Compliance

What is PCI-DSS Compliance and How Does It…

If your organization’s third parties suffered a data breach, would you be…
PSD2 and EU logo

What is PSD2 and How Does it Affect…

Payment services are a critical part of today’s digital commerce ecosystem, but…
What is CCPA and Determining Your Vendor's Compliance

What is CCPA and How Do You Know…

In an effort to prevent and mitigate the devastating consequences of cybercrime,…
What Is The ISO 27000 Series?

What Is The ISO 27000 Series?

Made up of 46 separate standards and developed by the IEC, the…
Securing Your Suppliers: Complying With Regulations

Securing Your Suppliers: Complying With Regulations

Organizations have much more than just data to lose in a third-party…
Panorays and RSA logo

Panorays Joins RSA® Ready Technology Partner Program

Panorays, a leading provider of third-party cyber risk management (TPCRM), is set…
Tips for Your Vendor Security: Building the Right Password Policy

Tips for Your Vendor Security: Building the Right…

Organizations still rely on passwords to ensure security, and so having secure…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely