We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Third-Party Security
Risk Management Blog

Learn about the latest research and happenings in TPCRM
AI In Risk Management

AI in Risk Management: Focusing on Third-Party Risk

According to SkyQuest Global research, only 39% of organizations today are using…
What is a Cyber Risk

Mitigating Third-Party Cyber Risk: A Strategic Approach

Recent surveys report that while 37% of organizations feel they are highly…
Cyber Threat Intelligence

Cyber Threat Intelligence: Defending Third-Party Risk

In 2021, the managed service provider (MSP) Kasaye suffered a massive ransomware…
Cybersecurity Questionnaires

The Role of Due Diligence Questionnaires in Business

Almost a quarter (19%) of data breaches last year occurred due to…
Attack Surface Management vs. Vulnerability Management

Attack Surface Management vs. Vulnerability Management

Third-party breaches from high-profile companies such as T-Mobile, Kaseya and SolarWinds have…
Supply Chain Vulnerability

Minimizing Supply Chain Vulnerability and Third-Party Risk

On February 21, 2021, the U.S. federal government signed an Executive Order…
Threat Intelligence Tools

How Threat Intelligence Tools Defend Against Third-Party Risk

On April 30, data from pilots of American Airlines Group Inc. and…
Business Resilience During Conflict

Business Resilience During Conflict in Israel

Remote work, security, and Third-Party Risk Management in times of crisis. Learn…
What is Data Leakage

The Dangers of Data Leakage: How to Keep…

In August, instant messaging service Discord announced that it had suffered a…
Common Vulnerabilities and Exposures

What is a CVE and How Does It…

There are currently 212,492 vulnerabilities identified, categorized and publicly cataloged in the national vulnerability…
AI in Cyber Security

How AI in Cyber Security Can Help Identify…

According to a recent study published by GrandView Research, global investment in…
MAS-TRM

The Role of MAS TRM in Robust Technology…

According to the Financial Times, in the first half of 2021 alone,…
Attack Surface Analysis

What Makes Attack Surface Analysis Effective? 

The rapid expansion of attack surfaces is not the challenge organizations face…
Digital Supply Chain

Evaluating the Digital Supply Chain for Third-Party Risk

In 2011, an underwater earthquake of 9.0 magnitude struck Japan – one…
API Attack

An API Attack: From Intrusion to Defense

In January of 2023, Twitter suffered a data breach that exposed the…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely