Panorays’ Blog

Third-Party Security
Risk Management Blog

Learn about the latest research and happenings in TPCRM
3 Essential Third-Party Cyber Risk Insights for CISOs in 2024

3 Essential Third-Party Cyber Risk Insights for CISOs…

Gain critical insights from the latest 2024 CISO Survey on third-party cyber…
Automated Risk Assessment

Why You Should Implement An Automated Risk Assessment

According to the EY 2023 Global Third-Party Risk Management Survey, 63% of…
CISO 2024 Survey

Panorays Study Finds 94% of CISOs Are Concerned…

Panorays 2024 CISO Survey determines the sentiments around third-party security management, AI-driven…
Digital Supply Chain Blind Spots

Uncovering Blind Spots in Your Digital Supply Chain

Although data breach announcements that impact an entire digital supply chain often…
Third Party Data Breaches

Third-Party Data Breaches in 2023: The Main Takeaways

An increasing number of leading brands, including T-Mobile, have made headlines over…
Security Questionnaires

The Questions You Need in a Security Questionnaire

Now, more than ever, managing third-party security risk is critical. And one…
Digital Supply Chain

Digital Supply Chain Risk Trends in 2023: A…

Forrester data reveals that 55% of security pros reported their organization experienced…
AI In Risk Management

AI in Risk Management: Focusing on Third-Party Risk

According to SkyQuest Global research, only 39% of organizations today are using…
What is a Cyber Risk

Mitigating Third-Party Cyber Risk: A Strategic Approach

Recent surveys report that while 37% of organizations feel they are highly…
Cyber Threat Intelligence

Cyber Threat Intelligence: Defending Third-Party Risk

In 2021, the managed service provider (MSP) Kasaye suffered a massive ransomware…
Cybersecurity Questionnaires

The Role of Due Diligence Questionnaires in Business

Almost a quarter (19%) of data breaches last year occurred due to…
Attack Surface Management vs. Vulnerability Management

Attack Surface Management vs. Vulnerability Management

Third-party breaches from high-profile companies such as T-Mobile, Kaseya and SolarWinds have…
Supply Chain Vulnerability

Minimizing Supply Chain Vulnerability and Third-Party Risk

On February 21, 2021, the U.S. federal government signed an Executive Order…
Threat Intelligence Tools

How Threat Intelligence Tools Defend Against Third-Party Risk

On April 30, data from pilots of American Airlines Group Inc. and…
Business Resilience During Conflict

Business Resilience During Conflict in Israel

Remote work, security, and Third-Party Risk Management in times of crisis. Learn…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely