Blog

Top 5 Ways to Minimize the Risk of Third-Party Breaches

Aug 7, 2019
Third-party breaches are on the rise. According to a recent report by the Ponemon...

The 5 Most Notable Third-Party Data Breaches of 2019 (So Far)

Jul 30, 2019
It’s only mid-2019, but we’ve already experienced a significant amount of third-party breaches, and...

Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Jul 18, 2019
Customers Now Rely on Panorays to Reduce the Time Spent on Standardized Information Gathering...

What is SIG?

Jul 16, 2019
The SIG, short for "Standardized Information Gathering (Questionnaire)" is a repository of third-party information...

Expert Advice: How to Avoid Misconfigured Servers

Jul 2, 2019
Lately, we’ve seen a lot of news reports about databases inadvertently being exposed on...

Panorays Unveils New Tools for Auto Discovery of Third and Nth Parties and Geolocation of Digital Assets

Jun 18, 2019
One Click Automatically Displays Corporate Assets of Third-Party Vendors NEW YORK, June 18, 2019...

Fourth-Party Security: Another Level of Security Management

Jun 18, 2019
How secure are your third-party suppliers? And what about their suppliers? Panorays is focused...

Lane Bess, Security Industry Veteran, Joins Panorays as Advisor and Investor

Jun 7, 2019
Panorays, a rapidly growing provider of automated third-party security management, has announced that Lane...

Happy Birthday, GDPR!

May 22, 2019
It’s been one year since the General Data Protection Regulation was implemented, and it’s...

3 Reasons Why Enterprises Hate Security Questionnaires

May 8, 2019
It’s not hard to understand why security questionnaires are necessary. Because regulations like GDPR...