Tips for Your Vendor Security: Building the Right Password Policy

Organizations still rely on passwords to ensure security, and so having secure passwords has never been more important. That’s why this subject is worth revisiting in honor of National Cybersecurity Awareness Month ...

Tips for Your Vendor Security: How to Prevent Phishing Attacks

Phishing is an attempt to deceive a victim in order to gain access to confidential information and/or distribute infected files. Even with the latest technologies that prevent many phishing emails from reaching ...

Panorays Debuts Dark Web Insights for Companies to Be Proactive About Monitoring Criminal Threats to Their Supply Chain

NEW YORK, October 2, 2019 – Panorays, a rapidly growing provider of automated third-party security lifecycle management, today unveiled a security intelligence solution known as Dark Web Insights. The new feature enhances ...

Join Panorays at secureCISO San Francisco!

On Thursday, September 26, Panorays will gather with InfoSec leaders at secureCISO in San Francisco ...

The 3 Lifecycle Stages of Vendor Security Risk Management: Offboarding

| | FEATURED, risk, Third-Party
This is the third in a three-part guest blog series looking at risk management throughout the lifecycle of a third party relationship. Previously we looked at the onboarding process, then we explored ...

The 3 Lifecycle Stages of Vendor Security Risk Management: Ongoing Monitoring

| | FEATURED, risk, Third-Party
Ongoing Security Monitoring has Become a Must Too often organizations conduct security due diligence when onboarding a third party (e.g., vendor, supplier, outsourced, service provider, consultant) and fail to monitor security throughout ...

The 3 Lifecycle Stages of Vendor Security Risk Management: Onboarding

| | FEATURED, risk, Third-Party
This is the first of a three-part series on vendor risk management through the lifecycle of the relationship. Today, we focus on steps to achieve a proper and friction-free onboarding process ...

Top 5 Ways to Minimize the Risk of Third-Party Breaches

Third-party breaches are on the rise. According to a recent report by the Ponemon Institute, over 60% of US companies experienced a data breach caused by one of their third parties in ...

What is SIG?

| | FEATURED, Third-Party
The SIG, short for "Standardized Information Gathering (Questionnaire)" is a repository of third-party information security and privacy questions, indexed to multiple regulations and control frameworks. SIG is published by a non-profit called ...

Expert Advice: How to Avoid Misconfigured Servers

Lately, we’ve seen a lot of news reports about databases inadvertently being exposed on the internet as a result of servers that are not configured correctly. This exposed data can include private ...
Loading...