Best Practices for Automating Third-Party Risk Management

Best Practices for Automating Third-Party Risk Management

Businesses are increasingly relying on third-party vendors to support their operations. As corporate networks grow beyond traditional…
How Security Automation Works

How Security Automation Works

Organizations face an ever-growing array of cyber challenges. The traditional manual approaches to security are no longer…
Federal Privacy Legislation: What You Need to Know

Federal Privacy Legislation: What You Need to Know

While the Internet offers consumers a veritable wealth of information, goods, and services, it is also a…
Google-Owned VirusTotal Data Leak: Result of Human Error

Google-Owned VirusTotal Data Leak: Result of Human Error

The recent data leak at Google-owned VirusTotal exposed information on approximately 5,600 of its registered customers. The…
Cyber Risk Management as a Best Practice: Benefits to Financial Firms

Cyber Risk Management as a Best Practice: Benefits to Financial Firms

According to BitSight,  the financial services industry is a high-value target for threat actors. Firms in this…
Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Please tell us about yourself, your background, and your journey of becoming a CISO for the Dallas…
Selecting the Best Cyber Risk Quantification Models for Your Organization

Selecting the Best Cyber Risk Quantification Models for Your Organization

Quantitative risk analysis refers to a numeric projection of the total impact of a given risk on…
Security Audit Benefits for Small Businesses

Security Audit Benefits for Small Businesses

What is a Security Audit? A cyber security audit is like a health checkup for an organization’s…
Benefits of Information Security Automation

Benefits of Information Security Automation

What is Information Security Automation? Security automation refers to the use of technology and tools to automate…
Crafting a Successful Cybersecurity Risk Management Strategy

Crafting a Successful Cybersecurity Risk Management Strategy

In a world where cyber risks lurk in the dark shadows of our networks, one thing is…
How to Show the Efficiency of a Vulnerability Management Program

How to Show the Efficiency of a Vulnerability Management Program

What is Vulnerability Management? Vulnerability management is a critical element of information security. With cyber-attacks and data…
Important Features of a Digital Risk Protection Service

Important Features of a Digital Risk Protection Service

What is Digital Risk? Digital risk is the term for the negative effects that result from implementing…
Automated Regulatory Compliance Management - Key Reasons to Implement Immediately

Automated Regulatory Compliance Management - Key Reasons to Implement Immediately

Introduction For almost any business, being compliant with regulations is an important part of operating efficiently. However,…
How ISO Standards Address Third-party Risk Management

How ISO Standards Address Third-party Risk Management

ISO is one of the most widely used vendor risk management frameworks. Certification to ISO/IEC 27001 is…
Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Please tell us a bit about yourself, your background, and your journey of becoming a co-founder and…
Student Data Privacy: Balancing Privacy and Innovation

Student Data Privacy: Balancing Privacy and Innovation

Privacy a Growing Risk for Students  Along with this explosion in the growth of online learning tools…
Vendor Management Best Practices for Lasting Success

Vendor Management Best Practices for Lasting Success

What is Vendor Risk Management? Managing the risks posed by the large network of vendors associated with…
Preparing for the Future of EdTech Security: What Companies Need to Know

Preparing for the Future of EdTech Security: What Companies Need to Know

What is EdTech? Short for education technology,  EdTech includes applications and digital technology used in primary, secondary,…
Texas Privacy and Security Act: Key Points

Texas Privacy and Security Act: Key Points

And Then There Were Ten The Texas Data Privacy and Security Act (HB4) was approved by the…
High-profile Data Breaches: the Controls That Could Protect You

High-profile Data Breaches: the Controls That Could Protect You

Data breaches can have far-reaching financial and reputational impacts on your business.  Without proper attention to detail…
Cyber Leaders of the World: Andrew Dutton, Virtual CISO at DuHart Consulting

Cyber Leaders of the World: Andrew Dutton, Virtual CISO at DuHart Consulting

Please tell us a bit about yourself, your background, and your journey of becoming a Virtual CISO…
NIST 800-171 Revision 3: The Impact on CMMC Compliance and How To Get Ready

NIST 800-171 Revision 3: The Impact on CMMC Compliance and How To Get Ready

If you are a company that holds a contract with the DoD and handles CUI, you are…

Centraleyes Central Class: Mastering Cyber Risk and Compliance Management - Best Practices and Solutions

Watch this Central Class session to learn how you can streamline your cyber risk and compliance management.…
How to Prepare for Montana Consumer Data Privacy Law

How to Prepare for Montana Consumer Data Privacy Law

They’re Coming Fast and Furious! On April 21, 2023, the Montana Consumer Data Privacy Act (MCDPA) passed…
Everything You Need to Know About the Tennessee Consumer Data Privacy Law

Everything You Need to Know About the Tennessee Consumer Data Privacy Law

First Same-Date Privacy Laws Tennessee and Montana just passed privacy laws on the same date, April 21,…
What Indiana State Data Privacy Law Means for Your Company

What Indiana State Data Privacy Law Means for Your Company

Last week, Senate Bill 5 passed unanimously in The Indiana House with a definitive 98-0 vote. The…
Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU

Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU

The key objective is to bring hands-on training and experience on best practices and the key role…
Iowa Passes Data Privacy Law: What You Need to Know to Be Compliant

Iowa Passes Data Privacy Law: What You Need to Know to Be Compliant

Iowa joined the privacy club last week when it passed a comprehensive consumer data privacy law, officially…

Centraleyes Product Webinar: Next Gen GRC - 3rd-Party Vedor Risk Management

Does the term GRC make you cringe? Do you find yourself procrastinating any task related to risk,…
Understanding Qualitative and Quantitative Risk Analysis in Definitive

Understanding Qualitative and Quantitative Risk Analysis in Definitive

Calculating risk is similar to attempting to forecast the future; you won’t always be accurate, but with…
Skip to content