We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Risk Management

Learn about the latest research and happenings in TPSRM
An Assessment a Day Keeps the Threat Actors Away

An Assessment a Day Keeps the Threat Actors Away

When considering their next target, threat actors consider two things: how challenging the target is, and how…
What is an SBOM and How Does it Help Assess Third-Party Security Risk?

What Is an SBOM and How Does It Help Assess Third-Party Security Risk?

Attackers continue to successfully target third parties, as a way to more easily circumvent an organization’s otherwise robust cybersecurity. In response, regulatory bodies have started to…
65% of Companies are Making this Mistake with Third-Party Security

65% of Companies Are Making This Mistake With Third-Party Security

In our recent survey on The State of Third-Party Security Risk Management we were very surprised to see that most companies are still making the same…
Lock

Third-Party Security Risk Management: A Critical Component of…

What is Third-Party Security Risk Management (TPSRM)? The terms vendor risk management…
4 Key Steps to Your Third Party Risk Management Process

4 Key Steps to Your Third-Party Risk Management…

If you’re like most organizations, you are highly dependent on third-party vendors…
Risk Management

Why It’s Crucial to Have an IT Vendor…

What is IT Vendor Risk Management (VRM)? Think about all of your…
Woman with binoculars

Finding a Common Language for Continuous Monitoring

Why we are proud to help create and support Shared Assessments’ Unified…
Log4Shell

Responding to the Log4Shell Vulnerability

By now, you've probably heard about the Log4Shell vulnerability. This post will…
On the radar: Panorays offers third-party security risk management

On the Radar: Omdia Report Highlights Panorays’ Unique…

Omdia has just released its new “On the Radar” report featuring Panorays:…
How Remote Working Introduces Additional Third-Party Risk

How Remote Working Introduces Additional Third-Party Risk

When the coronavirus first reared its ugly head, we didn’t truly understand…
What’s Integrated Risk Management (IRM) & Its Effects on TPRM

What Is Integrated Risk Management and How Does…

Integrated Risk Management (IRM) is a set of processes and practices that…
The National Vulnerability Database (NVD) & Third Party Security

The National Vulnerability Database & Third Party Security…

The National Vulnerability Database is a US government-run system that records a…
5 Must-Haves for Third-Party Risk Management Software

5 Features to Have in Your Third-Party Security…

If 2020 has taught businesses anything, it’s to “expect the unexpected.” The…
5 Key Considerations for Third-Party Risk Monitoring

5 Key Considerations for Third-Party Risk Monitoring

Companies are finally understanding the importance of having a full due diligence…
Man with a laptop

What is Inherent Risk and How It Should…

When it comes to business, a certain degree of risk will always…

Featured Authors

The Fastest and
Easiest Way to Securely
Do Business Together