We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Third-Party Security
Risk Management Blog

Learn about the latest research and happenings in TPCRM
CPRA Regulations

What are the CPRA Regulations Versus the CCPA?

In 2021, Black Kite reported leaks of personal information (PI) from 1.5…
SIG

What is a SIG and How is it…

Learn about SIG: Third-party security questionnaire repository for information gathering.
5 Key Security Controls That Should Be in Your SOC 2

5 Key SOC 2 Controls Your Organization Must…

You want to grow your business, but your customers want to be…
Vendor Due Diligence Checklist

What Is a Vendor Due Diligence Checklist and…

Enterprise risk management professionals worldwide confirm that enterprise risk has risen over…
NY SHIELD Act

What’s NY SHIELD Act and Ensuring Third-Party Compliance

In light of concerns over a growing number of cybersecurity threats and…
Risk Quantification

Understanding Risk Quantification for Security Teams

According to Trend Micro, almost half of IT leaders and only 38%…
Mastering IT Vendor Risk Management With Insights From Gartner

Mastering IT Vendor Risk Management With Insights From…

It can be challenging to navigate today’s complex cybersecurity landscape. With new…
Network Security Assessment

What Is a Network Security Assessment and Why…

The 38% increase in cyberattacks in 2022, according to the 2023 Security…
Cyber Security Monitoring

What is Cyber Security Monitoring?

Cyber security monitoring is the process of continuously monitoring IT infrastructure to…
CAIQ

What is the Consensus Assessments Initiative Questionnaire (CAIQ)?

The Cloud Security Alliance’s Consensus Assessment Initiative Questionnaire (CAIQ) is used by…
Third-party data breaches

The 4 Most Notable Third-Party Data Breaches of…

2022 was an eventful year in the world of third-party cybersecurity. In…
Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach

With lawsuits being filed following recent healthcare data breaches, companies must consider…
5 Best Practices for Protecting Sensitive Information

5 Best Practices for Protecting Sensitive Information Shared…

When you work with third parties, you often allow them access to…
Third-Party Security Requirements Your Vendors Should Follow

What You Need to Know About Third-Party Security…

If you’re like most companies, you want to do business with vendors…
Supplier Cyber Risk

5 Ways that Automation Helps Your Supplier Cyber…

It is no secret that there is a shortage of skilled cybersecurity…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely