What is the MNDPA?

The Minnesota Data Privacy and Security Act (MNDPA) is a comprehensive state-level privacy law designed to protect…

Essential Eight

What is the Essential Eight? The Essential Eight is a cybersecurity framework developed by the Australian Cyber…

Nebraska Data Privacy Act (NDPA)

What is the Nebraska Data Privacy Act? The Nebraska Data Privacy Act (NDPA) is a state-level privacy…

CJIS v5.9.5

What is CJIS (v5.9.5)? The Criminal Justice Information Services (CJIS) Security Policy v5.9.5 is a comprehensive security…

Kentucky Consumer Data Protection Act (KCDPA)

What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed…

Centraleyes Privacy Framework (CPF)

What is the CPF? The Centraleyes Privacy Framework (CPF) is a comprehensive compliance tool designed to help…

Florida Digital Bill of Rights (FDBR)

What is the Florida Digital Bill of Rights (FDBR)? The Florida Digital Bill of Rights (FDBR) is…

Nevada Privacy Act

What is the Nevada Privacy Act? The Nevada Privacy Act (NPA), also referred to as NRS 603A,…

Iowa Consumer Data Protection Act (ICDPA)

What is the Iowa Consumer Data Protection Act (ICDPA)? The Iowa Consumer Data Protection Act (ICDPA) is…
Snowflake Breach Snowballs

Snowflake Breach Snowballs

In a concerning turn of events, a breach in Snowflake’s cloud storage system has resulted in a…

AI Governance

What is the Centraleyes AI Governance Framework? The AI Governance assessment, created by the Analyst Team at…
Cybersecurity in Sports: A New Arena for Risk Management

Cybersecurity in Sports: A New Arena for Risk Management

In the high-stakes world of professional sports, the action isn’t just on the field. Behind the scenes,…
Cisco Raises Concerns Over Surge in Brute-Force Attacks Targeting VPN and Web Services

Cisco Raises Concerns Over Surge in Brute-Force Attacks Targeting VPN and Web Services

Cisco has sounded the alarm on a widespread increase in brute-force attacks targeting various devices, including Virtual…

ISO 42001

What is ISO 42001 (AI)? Artificial intelligence (AI) has emerged as a transformative technology, imbuing machines with…

NIS2

What is NIS2? NIS2 is a high-level directive, strengthening cybersecurity. To enhance Europe’s resilience against existing and…

NIST AI RMF

What is NIST AI RMF? As artificial intelligence gains traction and becomes increasingly more popular, it is…
Navigating the Cyber Currents: Ensuring a Watertight Critical Infrastructure

Navigating the Cyber Currents: Ensuring a Watertight Critical Infrastructure

Addressing recent cyber threats, a top White House national security official emphasized the imperative for increased cybersecurity…
Critical Atlassian Flaw Has a Simple Fix

Critical Atlassian Flaw Has a Simple Fix

Atlassian has issued a warning about CVE-2023-22518. The severe flaw is described as an “improper authorization vulnerability…
D.C. Voter Data Leak: What We Know So Far

D.C. Voter Data Leak: What We Know So Far

The District of Columbia Board of Elections (DCBOE) has reported a security incident involving the breach of…

DORA EU

What is DORA (EU)? The DORA Regulation (No. 2022/2554), known as the Digital Operational Resilience Act, is…
Skip to content