We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Third-Party Security
Risk Management Blog

Learn about the latest research and happenings in TPCRM
NIST Cybersecurity Framework

The NIST Cybersecurity Framework (CSF) and TPRM

With the increasing use of artificial intelligence (AI), emphasis on cloud-first strategies…
3 Essential Third-Party Cyber Risk Insights for CISOs in 2024

3 Essential Third-Party Cyber Risk Insights for CISOs…

Gain critical insights from the latest 2024 CISO Survey on third-party cyber…
Automated Risk Assessment

Why You Should Implement An Automated Risk Assessment

According to the EY 2023 Global Third-Party Risk Management Survey, 63% of…
CISO 2024 Survey

Panorays Study Finds 94% of CISOs Are Concerned…

Panorays 2024 CISO Survey determines the sentiments around third-party security management, AI-driven…
Digital Supply Chain Blind Spots

Uncovering Blind Spots in Your Digital Supply Chain

Although data breach announcements that impact an entire digital supply chain often…
Third Party Data Breaches

Third-Party Data Breaches in 2023: The Main Takeaways

An increasing number of leading brands, including T-Mobile, have made headlines over…
Security Questionnaires

The Questions You Need in a Security Questionnaire

Now, more than ever, managing third-party security risk is critical. And one…
Digital Supply Chain

Digital Supply Chain Risk Trends in 2023: A…

Forrester data reveals that 55% of security pros reported their organization experienced…
AI In Risk Management

AI in Risk Management: Focusing on Third-Party Risk

According to SkyQuest Global research, only 39% of organizations today are using…
What is a Cyber Risk

Mitigating Third-Party Cyber Risk: A Strategic Approach

Recent surveys report that while 37% of organizations feel they are highly…
Cyber Threat Intelligence

Cyber Threat Intelligence: Defending Third-Party Risk

In 2021, the managed service provider (MSP) Kasaye suffered a massive ransomware…
Cybersecurity Questionnaires

The Role of Due Diligence Questionnaires in Business

Almost a quarter (19%) of data breaches last year occurred due to…
Attack Surface Management vs. Vulnerability Management

Attack Surface Management vs. Vulnerability Management

Third-party breaches from high-profile companies such as T-Mobile, Kaseya and SolarWinds have…
Supply Chain Vulnerability

Minimizing Supply Chain Vulnerability and Third-Party Risk

On February 21, 2021, the U.S. federal government signed an Executive Order…
Threat Intelligence Tools

How Threat Intelligence Tools Defend Against Third-Party Risk

On April 30, data from pilots of American Airlines Group Inc. and…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely