We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Compliance & Regulations

Learn about the latest research and happenings in TPSRM
MAS-TRM

The Role of MAS TRM in Robust Technology Risk Governance

According to the Financial Times, in the first half of 2021 alone, the financial industry faced over…
HIPAA Compliance Audit

Getting Ready for HIPAA Compliance Audit

The HIPAA Audit: What to Know Before You Get the Notice The Health Insurance Portability and Accountability Act (HIPAA) is a set of laws that govern…
SBOM

How an SBOM Helps Assess Third-Party Security Risk

In 2020, a public company based in Tulsa, Oklahoma that sells software for IT, monitoring and networks was hacked. As a software provider to tens of…
GRC Cyber Security

GRC Cyber Security: GRC Tools’ Gap in Third-Party…

Understanding the Power of GRC Cyber Security Functionality Cyber Security is an…
CPRA Regulations

What are the CPRA Regulations Versus the CCPA?

In 2021, Black Kite reported leaks of personal information (PI) from 1.5…
5 Key Security Controls That Should Be in Your SOC 2

5 Key SOC 2 Controls Your Organization Must…

You want to grow your business, but your customers want to be…

What’s NY SHIELD Act and Ensuring Third-Party Compliance

In light of concerns over a growing number of cybersecurity threats and…
DORA: What Financial Institutions Need to Know

DORA: What Financial Institutions Need to Know

In response to rising frequency and severity of cyberattacks on financial institutions,…
Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
EBA Guidelines

The Impact of EBA Guidelines on Third-Party Risk…

There are many types of third-party vendors whose activities, as they relate…
A hand holding money coming out of a safe

What is SYSC 8 and Mitigating Third-Party Security…

Technological advancements in the financial sector have made life easier for everyone,…
CIA Triad

What is the CIA Triad and How Can…

When most people hear the three letters CIA in succession, they think…
What Is GLBA & How Do You Ensure Third Party Compliance?

What Is GLBA and How Do You Know…

The Gramm-Leach-Bliley Act (GLBA) is one of the most common regulatory compliance…
Lady Justice

What is OCC and How Does It Affect…

The Office of the Comptroller of the Currency (OCC) is one of…
What is PCI DSS Compliance

What is PCI-DSS Compliance and How Does It…

If your organization’s third parties suffered a data breach, would you be…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely