Top 5 Ways to Minimize the Risk of Third-Party Breaches

Third-party breaches are on the rise. According to a recent report by the Ponemon Institute, over 60% of US companies experienced a data breach caused by one of their third parties in 2018, up from 49% in 2016. 
The post Top 5 Ways to Minimiz… Continue reading Top 5 Ways to Minimize the Risk of Third-Party Breaches

Fourth-Party Security: Another Level of Security Management

How secure are your third-party suppliers? And what about their suppliers?
Panorays is focused on third-party security management – that is, the security posture of suppliers, vendors, partners and others doing business with an organization…. Continue reading Fourth-Party Security: Another Level of Security Management

Can access tokens be given to a third party app’s end users for a secure read/write process flow?

I have a B2B web app (and API) called XYZ. I have business customer ABC (and DEF, GHK, etc.), each of which have their own web app with their own distinct users. When a new user of ABC (or DEF, etc.) registers, they also crea… Continue reading Can access tokens be given to a third party app’s end users for a secure read/write process flow?

Interview Excerpts: Third-Party Security – Challenges and Solutions

Earlier this month, Panorays CEO and co-founder Matan Or-El spoke about third-party security at the secureCISO event in New York. Here are some of his remarks:
The post Interview Excerpts: Third-Party Security – Challenges and Solutions appe… Continue reading Interview Excerpts: Third-Party Security – Challenges and Solutions