rotem
rotem
Centraleyes Product Webinar: Next Gen GRC - 10x Faster, 10x Better!
Does the term GRC make you cringe? Do you find yourself procrastinating any task related to risk,…
IRS publication 1345
What is IRS p1345? The IRS publishes guidance documents in relation to taxes. This handbook is for…
Vendor Breach at Idaho Hospital
St. Luke’s Health System in Boise, Idaho had to notify patients of a data breach that took…
Healthcare Data DominoesÂ
Pre-July 4th weekend, Professional Finance Company (PFC USA) notified the patients of 657 country-wide healthcare providers of…
Secure Controls Framework (SCF)
What is Secure Controls Framework (SCF)? The Secure Controls Framework is a comprehensive list of controls created…
Cyber Resilience Review (CRR)
What is Cyber Resilience Review (CRR) The Cyber Resilience Review (CRR) assessment is a tool that measures…
Cyber Essentials (UK)
What is Cyber Essentials (UK)? Cyber Essentials is a government-backed scheme that was created to help organizations…
OWASP SAMM
What is OWASP SAMM? SAMM (Software Assurance Maturity Model) is an OWASP framework designed to assist organizations…
Insider Threat Mitigation
What is Insider Threat Mitigation? In September 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) published…
Personal Information Privacy Law (PIPL) of China
What is PIPL? Personal Information Privacy Law (PIPL) is the new Chinese data privacy law that became…
Ransomware Readiness Assessment
What is the Ransomware Readiness Assessment? The Ransomware Readiness Assessment (RRA) was released by the US Cybersecurity…