Secure Controls Framework (SCF)

What is Secure Controls Framework (SCF)? The Secure Controls Framework is a comprehensive list of controls created…

ESG

What is ESG? ESG compliance drives a company to operate with conscious regard towards the environment, social…

Cyber Resilience Review (CRR)

What is Cyber Resilience Review (CRR) The Cyber Resilience Review (CRR) assessment is a tool that measures…

Centraleyes Product Webinar: Next Gen GRC - 10x Faster, 10x Better!

Does the term GRC make you cringe? Do you find yourself procrastinating any task related to risk,…

Cyber Essentials (UK)

What is Cyber Essentials (UK)? Cyber Essentials is a government-backed scheme that was created to help organizations…

ISO 27002

What is ISO/IEC 27002? ISO/IEC 27002:2013, titled “Information technology — Security techniques — Code of practice for…

OWASP SAMM

What is OWASP SAMM? SAMM (Software Assurance Maturity Model) is an OWASP framework designed to assist organizations…

UAE IA

What is the UAE IA Regulation?  The UAE’s Telecommunications Regulatory Authority (TRA) released the Information Assurance (IA)…

Insider Threat Mitigation

What is Insider Threat Mitigation? In September 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) published…

Personal Information Privacy Law (PIPL) of China

What is PIPL? Personal Information Privacy Law (PIPL) is the new Chinese data privacy law that became…

Ransomware Readiness Assessment

What is the Ransomware Readiness Assessment? The Ransomware Readiness Assessment (RRA) was released by the US Cybersecurity…
Some Useful Links for You to Get Started

Some Useful Links for You to Get Started

It seems like you’re running a default WordPress website. Here are a few useful links to get…