Mar 01, 2021 2 min read
Why We Are Proud to Be Recognized in Forrester’s New Wave™
We are thrilled to announce that Panorays has been named in The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021 evaluation as a Strong Performer. But more importantly, we are proud to be recognized for what we believe makes Panorays different from other solutions. Panorays is unique in that it combines automated, dynamic security questionnaires with external attack surface...
Subscribe to our blog
Get the latest posts in your email
Mar 01, 2021 3 min read
Panorays Recognized as a Strong Performer by Independent Research Firm in Cybersecurity…
New report says that Panorays “stands out for its workflow capabilities, accuracy and risk context.” NEW YORK, March 1, 2021 — Panorays, a rapidly growing provider of third-party security risk management software, today announced that it has been named a Strong Performer in The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021 evaluation. The analyst report found that...
Feb 25, 2021 6 min read
Can You Predict or Prevent a Breach Like SolarWinds?
I have spent thousands of hours for more than a decade answering a range of cybersecurity questions from people around the globe. However, in the past couple of months, I have been inundated with one single question: Could the SolarWinds third-party security breach have been predicted or prevented? What they—and thousands of other companies—are really wondering following the infamous breach...
Feb 18, 2021 2 min read
New Guide: Automating Third-Party Cyber Risk Management
The vast majority of organizations work with third parties, but they also must be attentive to the potential cyber risks that suppliers may bring. Since hiring suppliers effectively increases an organization’s attack surface, a thorough cyber risk assessment process must be put in place to check third-party cyber posture and remediate any cyber gaps. Failure to do so can result...
Feb 11, 2021 4 min read
5 Ways to Prevent Third-Party Data Breaches
We know that third-party data breaches are on the rise. According to one report, 83% of organizations suffered a breach at the hands of a third party within the past three years. And if the SolarWinds breach has taught us anything, it’s that third-party data breaches can be devastating, and they are not going away anytime soon. What can organizations...
Feb 02, 2021 4 min read
How Remote Working Introduces Additional Third-Party Risk
When the coronavirus first reared its ugly head, we didn’t truly understand the implications it would have on our lives and on our businesses. But by March 2020 it was pretty clear that the implications would be huge, beginning with businesses moving their entire operations to remote locations, ostensibly overnight. This sudden transition from in-company to remote working presented a...
Jan 27, 2021 4 min read
How the NIST Cybersecurity Framework Helps You Respond to a Vendor Breach
As if we didn’t have enough to think about when it comes to our own organization’s security posture, we also have to consider the cybersecurity of companies we do business with—our third parties (and their third parties). Even when you’ve done everything you can to reduce the inherent risks of working with other companies, by bringing them into alignment with...
Five Most Common Third-Party Cyber Gaps Download Now
Jan 20, 2021 3 min read
4 Key Steps to Your Third-Party Risk Management Process
If you’re like most organizations, you are highly dependent on third-party vendors to efficiently run your business. On the flip side, vendors present risks which can have serious legal, financial and business repercussions, making vendor risk assessments more essential than ever. But how do you effectively manage hundreds, if not thousands, of vendors? Here are four key steps that should...
Nov 26, 2019 3 min read
3 Key Points About CCPA
What is CCPA? The California Consumer Privacy Act (AB 375), which will go into effect on January 1, 2020, is expected to significantly strengthen data collection and privacy in the USA. Similar to the way the General Data Protection Regulation (GDPR) defined data privacy in Europe, the CCPA regulation is expected to set the standard for data privacy in...
May 08, 2019 3 min read
3 Reasons Why Enterprises Hate Security Questionnaires
It’s not hard to understand why security questionnaires are necessary. Because regulations like GDPR and NYDFS are holding businesses accountable for their third parties’ cybersecurity, it’s important for enterprises to assess and continuously monitor all vendors, suppliers and business partners. And the initial vetting of any third parties typically begins with a comprehensive security questionnaire to evaluate cyber posture. (more…)