Mourne Fourie
Mourne Fourie
Centraleyes Announces the Addition of NYDFS to its Expanding Framework Library
Centraleyes announces the addition of the New York Department of Financial Services (NYDFS) Cybersecurity Regulation to its…
Top 3 Benefits of Cybersecurity Incident Response Plan
Cyber incidents are at the forefront of executives’ minds, earning the number one spot in a recent…
Cyber Leaders of the World: Sagar Narasimha, CISO at Amagi
Please tell us a bit about yourself, your background and your journey of becoming a CISO I…
Vulnerability Management vs. Risk Management: Everything you Need to Understand
Risk management and vulnerability management are often used interchangeably, but they are two different practices. Risk management…
Centraleyes Maps PCI DSS to its Expanding Control Inventory
Centraleyes announces the addition of PCI DSS to its extensive framework library. The PCI DSS refers to…
How to Improve Your Vendor Cybersecurity Questionnaire
Evaluating your vendors, partners, and suppliers’ cybersecurity posture has never been more critical. Unfortunately, around 45% of…
Vendor Security Risk Management Best Practices You Need to Know
Risk management has become necessary for organizations worldwide, regardless of industry or size. Vendor risk management, often…
5 Ways Security Leaders Can Scale GRC Programs
Governance, risk, and compliance (GRC) programs have become essential to the modern business landscape across all industries.…
Centraleyes Adds ISO 22301 to its Extensive Framework Library
Centraleyes announces the addition of the ISO 22301 Business Continuity Management Framework to its expanding framework library.…
Why Managing Cyber Risk Is Business Critical Today
Businesses have been investing in cybersecurity for decades, but cybercrime hasn’t gone away. Instead, the opposite has…
Operational Risk Management: Benefits and Challenges
Businesses across all industries face risks throughout their operations. Risks can target nearly every aspect of your…
Cyber Leaders of the World: Seema Sharma, Global Head of Information Security & Data Privacy at Servify
Please tell us a bit about yourself, your background, and your journey in Servify I have 15+…
Compliance Evidence Collection for Security Assurance Best Practices
Maintaining compliance isn’t just about avoiding fines — it’s about following frameworks designed to keep your company’s…
How Security Ratings Can Help Guide Cybersecurity Performance Management
Cybercrime has been growing at an alarming rate, and executives are now aware. Approximately 55% of enterprise…
Best Practices for Security Compliance Management
Cybersecurity frameworks exist to provide a unified security standard for organizations to follow to protect their data,…
Cyber Leaders of the World: Shay Siksik, VP of Customer Experience at XM Cyber
Please tell us a bit about yourself, your background and your journey at XM Cyber As a…
Cybersecurity Insurance Alone Isn’t Enough: Here’s Why
Cybercrime is expected to total $10.5 trillion annually by 2025. So it’s understandable why organizations seek out…
Centraleyes Integrates the South African Protection of Personal Information Act with its GRC Platform
Centraleyes announces the addition of the new South African data privacy framework, the Protection of Personal Information…
Inherent vs. Residual Risk: What's the Difference?
It’s estimated that cybercrime collectively costs organizations $16.4 billion per day, or $190,000 per second. Evaluating risks,…
Centraleyes Adds the Secure Controls Framework to its Expanding Framework Library
Centraleyes announces the addition of the Secure Controls Framework (SCF) to its expanding framework library. The Secure…
6 Steps to Successful Risk Management for Insurance Companies
With escalating threats to cybersecurity, businesses are searching for ways to supplement traditional security and to protect…
5 Reasons Why B2B Startups Need SOC 2 Compliance
A smart step for any startup looking to close enterprise deals and take their company to the…
Top UAE Cybersecurity Conferences
Organizations across all industries are becoming increasingly aware of the need for modern cybersecurity techniques to protect…
5 Best Tips to Perform a Successful IT Risk Assessment
Cybersecurity has never been more critical than it is today. A new cyber attack starts every 40…
The Top Cybersecurity Breaches in the UAE
The global cost of cybercrime was estimated at US$6.1 trillion in 2021 and is expected to keep…
Centraleyes Integrates the Cyber Resilience Review Assessment to its next-gen GRC Platform
Centraleyes announces the addition of the Cyber Resilience Review (CRR) security assessment to its expanding framework library.…
Internal Controls and Data Security: Minimize Your Security Risk
The need for internal controls in a security program is crucial. They ensure you have proper measures…
Centraleyes Announces the addition of the UAE IA Compliance Regulation to its Framework Library
Centraleyes has recently announced the addition of the UAE IA compliance regulation to its expanding framework library.…
What Is an Executive Summary in Cyber Security Risk Reporting?
When you want to communicate with another person, the clearest way is to speak the same language.…
Centraleyes Adds ISO 27701 to its Framework Library
Centraleyes is excited to announce the addition of ISO 27701 security standard to its expanding framework library.…