How the Cyber Grinch Stole Christmas: Managing Retailer Supply Chain Cyber Risk

How the Cyber Grinch Stole Christmas: Managing Retailer Supply Chain Cyber Risk

Cyber threats are always a prominent risk to businesses, especially those operating with high quantities of customer information in the retail space, with over 50% of global retailers were breached last year ...
4 Key Cybersecurity Predictions for 2020

4 Key Cybersecurity Predictions for 2020

What lies ahead in 2020? We asked Panorays researchers to weigh in on what they see as the key issues that will surface in the new year. Read on for their predictions ...

Hackers Come for Oil and Gas

Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware ...

Mitigating the Threat of Hackers to Your Supply Chain

The rate of digital disruption has recently skyrocketed across every industry, helping accelerate global expansion and automating mundane, menial tasks. Coupled with this is the fact that as businesses grow globally, we ...

Ransomware, Phishing, and Supply Chain the Most Significant Threats to UK Businesses

Trend analysis is an important topic within threat intelligence. It lets us forecast where things are headed; whether they’re getting better, worse or different; and where we should be focusing our precious ...

Clean IT Up: Cyber Hygiene Controls Tips

October is national cybersecurity awareness month, and with the recent hacks at Door Dash, the discovery of a large-scale iOS hacking campaign, and a database containing 419 million phone numbers associated with ...

Panorays and SANS Collaborate on Whitepaper and Webcast

| | FEATURED, supply chain, Webinar
Panorays has collaborated with the SANS Institute to produce "Success Patterns for Supply Chain Security,” a whitepaper authored by noted analyst John Pescatore, which was also the subject of a recent webcast ...
supply chain

The Journey of Securing a Long-Tail Supply Chain

Supply chains often are long and complex, and as organizations rely more and more on data to drive their businesses, digital supply chains continue to grow. And as the supply chains continue ...
Security Boulevard
Supply Chain Vulnerabilities from Legacy Approaches

Supply Chain Vulnerabilities from Legacy Approaches

| | DoD, PreVeil, supply chain
In a recent customer discussion, a CISO shared his concern with me regarding his company’s data. He worried that confidential data that had been shared with their suppliers would be leaked. He ...