App Developers Left 540 Million Facebook Users’ Records on the Public Internet

The exposures didn’t come from Facebook itself, but do show how data generated by one company can end up exposed thanks to another service. Continue reading App Developers Left 540 Million Facebook Users’ Records on the Public Internet

How does the Brave browser protect against sites that a person has already logged into?

I understand that the Brave browser does not allow for 3rd party cookies to be set so that a user will not be tracked by a 3rd party site.

However if I were to log into a site like Facebook and navigate to a site that is usi… Continue reading How does the Brave browser protect against sites that a person has already logged into?

Panorays Earns a Perfect 5 Stars in SC Media Review

We are excited to announce that Panorays scored a perfect five out of five stars in SC Media’s recent reviews of vendor security risk management solutions.
The post Panorays Earns a Perfect 5 Stars in SC Media Review appeared first on Security Bouleva… Continue reading Panorays Earns a Perfect 5 Stars in SC Media Review

New Guide: Learn the BRAVE Approach to Automating Third-Party Security

Third-party data breaches can wreak havoc on organizations. Such incidents are increasing in severity and take place across all industries, including healthcare, government and eCommerce.
The post New Guide: Learn the BRAVE Approach to Automating … Continue reading New Guide: Learn the BRAVE Approach to Automating Third-Party Security

How Panorays is Different Than Other Third-Party Risk Management Solutions

With so many players in the TPRM space, it’s often tough to tell the difference between them. There’s a lot of noise, and it all sounds the same. But is it?
The post How Panorays is Different Than Other Third-Party Risk Management Solu… Continue reading How Panorays is Different Than Other Third-Party Risk Management Solutions

Best Practices for exporting sensitive database data and transforming it whilist keeping it encrypted?

Say one has to export database data to use in another tool, such as an Excel Spreadsheet or for use as a csv file with some other program.

There’s a problem with this, and that’s that it ends up in an unencrypted form on the… Continue reading Best Practices for exporting sensitive database data and transforming it whilist keeping it encrypted?

5 Key Features Your Security Risk Assessment Should Have

The online world is teeming with cyber threats at the same time that data privacy regulations are being created and enforced. This means that your organization could very well suffer a data breach and would face stiff penalties for it—not … Continue reading 5 Key Features Your Security Risk Assessment Should Have

3 Reasons Why You Should Manage Your Third-Party Security Better in 2019

If you are worried about managing your third parties, you are not alone. Gartner reports that nearly 70% of chief audit executives reported third-party risk as one of their top concerns, but many still struggle to manage this risk.
The post 3 R… Continue reading 3 Reasons Why You Should Manage Your Third-Party Security Better in 2019