Panorays’ Blog

Security Frameworks

Learn about the latest research and happenings in TPCRM

Panorays Earns ISO/IEC 42001 Certification: What It Means for the Future of AI in Third-Party Cyber Risk Management

AI is officially everywhere in cybersecurity, from how we evaluate vendors to how we detect risks that…
Residual Risk

What Does Residual Risk Mean in the Risk Management Process?

5 Key Things You Need to Know About Residual Risk Residual risk is the remaining exposure after all security controls are in place It acknowledges that…
How to implement zero trust

Zero Trust vs Least Privilege: Which Should Come First in Your Security Strategy?

As cyber threats grow more sophisticated, identity-driven security models like Zero Trust and Least Privilege are taking center stage. These approaches emphasize the importance of controlling…
Shorten the Vendor Sales Cycle

Building an Effective Vendor Management Framework for Your…

Businesses today rely on a growing network of third-party vendors to support…
Center for Internet Security CIS

How Security Controls Help Manage Third-Party Risk

Information security controls are actions an organization takes to protect against unauthorized…
DNSSEC

DNSSEC: What Is It and Why Is It…

DNSSEC is a security protocol that adds public key cryptographic signatures to…
FISMA

What is FISMA and How Does it Protect…

FISMA, or the Federal Information Security Management Act, was first legislated in…
NIST Cybersecurity Framework

News in TPRM: NIST Releases Cybersecurity Framework 2.0

On February 26, the National Institute of Standards and Technology released the…
What is HECVAT - Higher Education Community Vendor Assessment Toolkit

What is HECVAT? Vendor Assessment in Higher Education

HECVAT, also known as the Higher Education Community Vendor Assessment Toolkit, is…
NIST Cybersecurity Framework

The NIST Cybersecurity Framework (CSF) and TPRM

With the increasing use of artificial intelligence (AI), emphasis on cloud-first strategies…
Information Leakage

Understanding Information Leakage: What You Need to Know

In the midst of the global pandemic when its use was at…
SIG

What is a SIG and How is it…

Learn about SIG: Third-party security questionnaire repository for information gathering.
CAIQ

What is the Consensus Assessments Initiative Questionnaire (CAIQ)?

The Cloud Security Alliance’s Consensus Assessment Initiative Questionnaire (CAIQ) is used by…
Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
Center for Internet Security CIS

What Is the Center for Internet Security (CIS)…

The Center for Internet Security (CIS) is a nonprofit organization that seeks…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely