Centraleyes’s Resource Center
Centraleyes Provides You With Various Resources
On the Different Industries And Services
Resources | News & Updates
ToddyCat APT Aims High
A new Advanced Persistent Threat (APT) actor has been spotted by Kaspersky cybersecurity researchers attempting attacks on…
Interpol Takes Down 2000 Social Engineers
Justice prevailed for the victims of worldwide social engineering scams as police from 76 countries worked together…
Centraleyes Integrates the South African Protection of Personal Information Act with its GRC Platform
Centraleyes announces the addition of the new South African data privacy framework, the Protection of Personal Information…
Keep China Out: Patch Network Devices ASAP
The US government, specifically the NSA, FBI and CISA, have issued explicit warnings that hackers working for…
Centraleyes Adds the Secure Controls Framework to its Expanding Framework Library
Centraleyes announces the addition of the Secure Controls Framework (SCF) to its expanding framework library. The Secure…
Hijacked Whatsapp Accounts- Protect Yourself!
Sometimes the simplest scams are the most effective. Hackers managed to hijack victims’ Whatsapp accounts using mobile…
Pwn2Own- Successful Hacks
The annual Pwn2Own hacking contest, held in Vancouver, brought together security researchers from all over the world…
Centraleyes Integrates the Cyber Resilience Review Assessment to its next-gen GRC Platform
Centraleyes announces the addition of the Cyber Resilience Review (CRR) security assessment to its expanding framework library.…
The Critical F5 BIG-IP Vulnerability
A huge and critical vulnerability broke this week making headlines across cyber news sites. Why is this…
Centraleyes Announces the addition of the UAE IA Compliance Regulation to its Framework Library
Centraleyes has recently announced the addition of the UAE IA compliance regulation to its expanding framework library.…
Centraleyes Adds ISO 27701 to its Framework Library
Centraleyes is excited to announce the addition of ISO 27701 security standard to its expanding framework library.…
Tricked at the Top: US Dept. of Defense
Quite amazingly, a resident of California conducted a phishing operation and managed to successfully reroute government money…
Coca-Cola Breach: The Real Thing? 
The infamous Stormous ransomware gang claims to have breached Coca Cola’s servers, stealing 161 GB of data.…
Dwell-Time Down, Vigilance Up!
Mandiant, the cybersecurity company to be acquired by Google later this year, have released their Mandiant M-Trends…
Centraleyes Integrates OWASP MASVS to its Framework Library
Centraleyes is happy to announce the addition of OWASP MASVS security standard to its expanding framework library.…
Centraleyes Identified as an Outperformer and a Challenger in the GigaOm GRC Radar Report
Centraleyes reaches yet another milestone, being identified as an Outperformer in the Challenger group of the 2022…
Centraleyes Partners with UAE-based distributor, Evanssion, to bring local presence in a key market as part of its global expansion plans
Centraleyes announces its latest strategic partnership with UAE-based, value-added distributor, Evanssion.Evanssion is now promoting the Centraleyes next…
Centraleyes Adds Insider Risk Mitigation Security Standard to its Framework Library
Centraleyes is happy to announce the addition of the Insider Risk Mitigation security standard to its expanding…
Illegal Legal Hacks
Looks like Apple and meta will be undergoing some social engineering awareness training! Hackers posing as various…
Centraleyes Partners with Netsurit, Leading Global IT and Digital Transformation Managed Service Provider
Centraleyes announces its latest strategic partnership with New York-based, global IT and digital transformation managed service provider,…
You’ve Been Hacked: Roskomnadzor
Ukrainian anonymous hacking group, appropriately called Anonymous, announced over Twitter this week that they had breached and…
Using the Shed Light: Twitter vs. Russia
Defending and respecting the user’s voice is one of Twitter’s core values, according to their website. This…
Centraleyes Announces the Addition of PIPL its Framework Library
Centraleyes is happy to announce the addition of the Personal Information Privacy Law (PIPL) of China to…
Next-gen Botnets
It’s the plague of frogs- but not as you know it. First spotted in August 2020, “FritzFrog”…
Centraleyes Updates Newly Released CMMC 2.0 in its Framework Library
Centraleyes is excited to announce the upgrade of the new CMMC version 2.0 in its extensive framework…
Centraleyes Maps the Nevada Revised Statutes to its Control Inventory
Centraleyes is proud to announce the addition of the Nevada Revised Statutes (NRS), Chapter 603A to its…
Russian Hackers Infiltrate Ukrainian Organizations via Spear-Phishing
The world is watching with bated breath as Russia lines up its army along the borders of…
Centraleyes Adds the Ransomware Readiness Assessment Model to its Framework Library
Centraleyes is excited to announce the addition of the Ransomware Readiness Assessment (RRA) Model to its expanding…
The British are Coming- with SOX!
The UK’s corporate landscape begins the 2-year countdown to prepare for new governance, audit and reporting requirement:…
RCE Alert: Managing Vulnerabilities
Two critical bugs discovered in Control Web Panel means that an unauthenticated attacker can gain remote code…
When Imitation Isn’t the Best Form of Flattery
There is an exclusive top ten list that NO company wants to find themselves on: the Top…
Ransomware Shuts Down US Prison
Ransomware is always consequential to the company experiencing the attack, but in this case, the staff and…
Y2K22 Surprise!
Microsoft Exchange users were surprised when emails could not be delivered on January 1st, 2022. MEServers from…
DuckDuckGo For It!
Everyone is talking about DuckDuckGo, the search engine that has experienced enormous growth in 2021 and performs…
Securing from the Inside Out
Take your mind off of Log4j momentarily and consider a vastly different vulnerability. Garret Metal detectors, a…
Demystifying The Internet Meltdown: Log4j
The Log4Shell bug has taken the world by storm putting some of the biggest companies at risk…
Patching Backward to Move Forward: Top 6 Tips for Patch Management
These patches were released months ago, so how can threat actors continue to exploit the same vulnerabilities…
Phishing From Within
IKEA has been in the limelight this week as the target of a creative phishing campaign. Internal…
Critical Infrastructure targets take extra precautions this Thanksgiving
Another holiday weekend, another reason to be cyber vigilant! CISA and the FBI released a warning ahead…
300+ WordPress Sites Held Ransom By Fake Ransomware
Over 300 WordPress sites were attacked with fake encryption notices, informing them they must pay 0.1 bitcoin…
At Least Nine Global Entities Across Critical Sectors Have Been Exploited Via a Known CVE
Back in September, the Zoho MachineEngine ADSelfService Plus reported a critical vulnerability that would allow remote attackers…
Your Company is Under Intense Pressure. And That’s Exactly When They’ll Strike.
Ransomware actors are choosing their targets based on time-sensitive financial events, like mergers or acquisitions and ends…
You Haven’t Heard Of Groove Ransomware? Let’s Hope It Stays That Way
Not everyone was happy with the law enforcement’s take down of the REvil ransomware group last week.…
Claiming Unemployment? Watch Out!
The FBI put out a warning this week of spoofed websites offering unemployment benefits that harvest sensitive…
Lightning Never Strikes Twice? Ransomware Does
Back in September, leading medical technology company Olympus was hit with a ransomware attack on its EMEA’s…
“Do Your Part… Be Cyber Smart!” CISA
Cybersecurity Awareness is at an all-time high and has never been more meaningful! As the NCSA kicks…
OWASP Celebrated Their 20th Anniversary Last Week By Releasing a Brand New List Of Critical Security Risks For Web Apps
The OWASP Top 10 is the ultimate guide to the threats and remediations that companies should address,…
Hackers Continue To Target Critical US Infrastructure and Seek To Disrupt Supply Chains, But Are We Handing Them Access On A Silver Platter?
NEW Cooperative, an Iowa-based farm service provider, was hit with a ransomware attack in recent days. BlackMatter…
REvil Ransomware Returns And Continues To Attack And Leak Data
Guess who’s back in town? After wildly exploiting the zero-day Kaseya vulnerability back in July, and demanding…
CISA and The FBI Reveal An Interesting Warning Regarding Ransomware
Based on data from recent actor tactics, techniques, and procedures (TTPs), they report that ransomware attacks are…
When CISA Releases An Announcement Tagged As Urgent, You Know It's Urgent
Microsoft released a security update in May 2021 revealing three actively exploited ProxyShell vulnerabilities on Microsoft Exchange…
Centraleyes Announces the Addition of the NIST 800-82 Framework to its Framework Library
Centraleyes is proud to announce the addition of the NIST 800-82 Industrial Control Systems Cybersecurity Framework to…
Centraleyes is Featured in the Exclusive STAR Registry as an Official CSA Vendor
Centraleyes is proud to announce that the company is an official CSA STAR vendor, featured in the…
Centraleyes Maps the PSD2 Regulation to its Growing Framework Library
Centraleyes is proud to announce the addition of the PSD2 regulation to the growing framework library. The…
Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to its Board of Directors
Dan Burns, co-founder and former CEO of Optiv, one the largest SSI’s in the world, brings over…
Centraleyes Adds the FREPA Data Privacy Standard to its Framework Library
Centraleyes is excited to announce the latest addition to the Centraleyes framework library, the FERPA Data Privacy…
Centraleyes Announces the Addition of FedRAMP to its Framework Library
Centraleyes is proud to announce the addition of FedRAMP to the growing framework library. FedRAMP is one…
Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure
Online PR News – 04-May-2021 – New York – Centraleyes is excited to announce its latest strategic…
Centraleyes Adds the Recent Privacy Framework by NIST to its Framework Library
Centraleyes is strengthening its framework library with a new privacy framework recently published by NIST. The National…
Centraleyes Disrupts Risk Management With the First Ever Automated Risk Register
Centraleyes has released its latest platform update, which included a one of its kind capability – an…
Centraleyes Maps the CIS Top 20 Critical Controls to its Framework Library
Centraleyes continues to expand its framework library, with the latest addition of the CIS Top 20 Critical…
Centraleyes Partners with Chile-based, Tech Services Provider, Policomp
Online PR News – 05-March-2021 – Tel Aviv – Centraleyes is proud to announce its strategic expansion into…
Centraleyes Enhances its Framework Library with INCD Guidelines for Stronger Cyber Resilience
Centraleyes is strengthening its framework library with yet another risk guideline by the INCD. The Israel National…
Energy Industry Dedicated NERC CIP Standard - Now in the Centraleyes Framework Library
Centraleyes continues to expand its framework library coverage by adding NERC CIP, giving the energy industry a…
Zero Trust Framework - New Addition to the Centraleyes Framework Library
Centraleyes has added another key risk framework to its extensive framework library – the NIST SP 800-207…
Centraleyes Expands its Framework Library With NIST 800-171
Centraleyes is proud to announce the addition of NIST 800-171 to its library of frameworks and standards…
Centraleyes Selected as Top 10 Cyber Security Startups
Centraleyes is extremely proud to announce that it has been selected as one of the top 10…
Centraleyes Official Brand Video Released
Centraleyes is proud to present our official brand video! The video captures our brand’s optimistic spirit in…
Centraleyes Partners with the Cyber Alliance to Protect Healthcare Systems
Online PR News – 21-December-2020 – Tel Aviv – SaaS-based cyber risk platform provider Centraleyes has partnered…
CyGov Appointed Michelle Offir Geveye as Marketing Lead
CyGov has announced the appointment of Michelle Offir Geveye as the new Marketing Lead for the company…
Trevor Failor Named Head Of Sales At CyGov
Bringing two decades of experience in Cyber Security and SaaS sales, Trevor Failor has been appointed as…
CyGov Launches The Centraleyes™ Brand— Superior Platform Automating Inputs, Data & Visualizing Risks
CyGov has re-branded its cutting-edge cyber risk management platform that gives an unparalleled understanding of digital and…
Cygov Continues Upward Growth - Oleg Movchan Joins Board of Directors
Oleg Movchan, a capital markets and risk management veteran, has joined the company’s Board of Directors. 04-June-2020…
Jimmy Sanders, Head of Info Security at Netflix DVD, Joins Cygov Advisory Board
Sanders, one of the foremost authorities on contemporary cyber security challenges, is the latest high-profile addition to…
Cygov Agrees Partnership With R3, Targeting Federal Suppliers
The agreement boosts companies seeking Cybersecurity Maturity Model Certification (CMMC) certification, soon required by all Department of…
Cygov Announces Strategic Partnership with Top 200 MSSP Cybriant
Online PR News – 04-May-2020 – Tel Aviv – SaaS-based cyber risk platform provider CyGov announced today…
CyGov Releases Higher Education White Paper – Streamlining Risk & Reducing Workload
Digital technology has revolutionized the operations, administration and student-facing aspects of higher education. As universities, schools and…
CyGov and HIC Network Security Announce a Strategic Resell Partnership
CyGov is proud to announce that HIC Network Security Solutions, The Network Security Reseller, has become a…
CyGov Releases Free Cyber Resilience Resource for Businesses re-Deploying Remotely
1 April (Tel Aviv) – SaaS-based cyber risk platform provider CyGov announced today that in light of…
New From CyGov - Creation of a Proprietary Cyber Resilience Resource Center
In response to the epic Coronavirus threat, CyGov has created a unique cyber risk resilience management resource…
CyGov Solution Curbs Growing Risk of Supply Chain Breaches
More than ever before, companies of all sizes are at risk of a cyber breach via their…
Eric Moseman Named VP Sales at CyGov
CyGov is excited to announce that Eric Moseman has been appointed Vice President of Sales. He will…
- Yair Solow on CNN
- Yair Solow on i24 News
- Centraleyes on Cyber Ghost: Interview with Yair Solow
- Centraleyes Chosen as Global Top 5 Startups of the Year - Interview
- Spotlight Q&A with Centraleyes at Safety Detectives
- New Centraleyes 4th Generation Release Officially Goes Live
- Yair Solow Featured on VPN Mentor
- CyGov Signs a Strategic Agreement with R3 (Spanish)
- Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to Its Board of Directors
- Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure
- Centraleyes Introduces First Automated Risk Register
- Yair Solow Featured on Website Planet
- Trevor Failor named head of sales at CyGov
- CyGov is rebranding its platform as Centraleyes
- Cybersecurity Company Cygov Partners With Risk Management Company Foresight
- CyGov agrees strategic partnership with top 200 MSSP Cybriant
- Cyber Resilience Resource for Businesses Re-Deploying Remotely
- The Four New Pillars of Corporate Protection Yair Solow on InfoSecurity Magazine
- CyGov selected by SixThirty as Top Cyber Security Startup
- Europe's Top Cyber Security Startups
- Centraleyes Expands Automated Risk Register To Cover All Enterprise Risk
- CyGov Interviewed by MediaSet
- Eli Ben Meir's article in Security Intelligence
- CyGov Selected by WorldBank
- Eli Ben Meir OpEd in the Houston Chronicle
- Yair Solow and Eli Ben Meir Present at the SparkLabs Demoday 8
- Quantify Financial Risk With Centraleyes Platform Primary Loss Calculator
- Cover Your Entire Environment With Centraleyes's Risk Application Assessments
- Communicate Cyber Risk With Your Executives in an Intuitive, Beautifully Visualized Board Reporting
- Stay on Top of Your Vendors' Cyber History With In-Depth External Scans
- Automate the Creation and Maintenance of a Risk Register, Saving Hours on Manual Work
- Add a New Framework and Distribute Assessments in Your Organization
- View Your Organization's Risk Scoring Through the NIST Tiering Lens
- Most Intuitive Way for Compliance With the Framework Navigation Tool
- Always Prepared for the Next Task With Automated Remediation
- Effective Team Work With Drag-and-Drop Control Assignment
- Get Real-Time Critical Alerts That are Specifically Relevant to You
- MSSPs Can Manage Multiple Clients Under One Platform
- Onboard a New Vendor in Just 30 Seconds
- Turn Hours of Work Into Seconds with Centraleyes Vendor Risk Profile
- Always Informed with Centraleyes Domain Benchmarking
- ToddyCat APT Aims High
- Interpol Takes Down 2000 Social Engineers
- Centraleyes Integrates the South African Protection of Personal Information Act with its GRC Platform
- Keep China Out: Patch Network Devices ASAP
- Centraleyes Adds the Secure Controls Framework to its Expanding Framework Library
- Hijacked Whatsapp Accounts- Protect Yourself!
- Pwn2Own- Successful Hacks
- Centraleyes Integrates the Cyber Resilience Review Assessment to its next-gen GRC Platform
- The Critical F5 BIG-IP Vulnerability
- Centraleyes Announces the addition of the UAE IA Compliance Regulation to its Framework Library
- Centraleyes Adds ISO 27701 to its Framework Library
- Tricked at the Top: US Dept. of Defense
- Coca-Cola Breach: The Real Thing? 
- Dwell-Time Down, Vigilance Up!
- Centraleyes Integrates OWASP MASVS to its Framework Library
- Centraleyes Identified as an Outperformer and a Challenger in the GigaOm GRC Radar Report
- Centraleyes Partners with UAE-based distributor, Evanssion, to bring local presence in a key market as part of its global expansion plans
- Centraleyes Adds Insider Risk Mitigation Security Standard to its Framework Library
- Illegal Legal Hacks
- Centraleyes Partners with Netsurit, Leading Global IT and Digital Transformation Managed Service Provider
- You’ve Been Hacked: Roskomnadzor
- Using the Shed Light: Twitter vs. Russia
- Centraleyes Announces the Addition of PIPL its Framework Library
- Next-gen Botnets
- Centraleyes Updates Newly Released CMMC 2.0 in its Framework Library
- Centraleyes Maps the Nevada Revised Statutes to its Control Inventory
- Russian Hackers Infiltrate Ukrainian Organizations via Spear-Phishing
- Centraleyes Adds the Ransomware Readiness Assessment Model to its Framework Library
- The British are Coming- with SOX!
- RCE Alert: Managing Vulnerabilities
- When Imitation Isn’t the Best Form of Flattery
- Ransomware Shuts Down US Prison
- Y2K22 Surprise!
- DuckDuckGo For It!
- Securing from the Inside Out
- Demystifying The Internet Meltdown: Log4j
- Patching Backward to Move Forward: Top 6 Tips for Patch Management
- Phishing From Within
- Critical Infrastructure targets take extra precautions this Thanksgiving
- 300+ WordPress Sites Held Ransom By Fake Ransomware
- Flash Webinar: Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk
- Flash Webinar: How to Know When it's Time to Build a Risk Management Program
- Enhancing Cyber Risk Management Through the Power of Automation - Boutique Webinar
- Flash Webinar: From Technical to Business Risk - How to Communicate With Your Board
- Flash Webinar: What You Can Learn From the SolarWinds Attack to Lower Your Chances of Being Breached
- Flash Webinar: Supply Chain, 3rd-Party Vendors and the Silent Assassin Among Them
- Flash Webinar: Cyber Risk Management - it Doesn't Have to Be So Painful
- Critical Elements of Vendor Risk Management Automation
- How Security Ratings Can Help Guide Cybersecurity Performance Management
- Best Practices for Security Compliance Management
- Cybersecurity Insurance Alone Isn’t Enough: Here’s Why
- Inherent vs. Residual Risk: What's the Difference?
- PCI Audit – Checklist & Requirements
- 5 Steps of the Risk Management for Insurance Companies
- How to Get PCI DSS Certification?
- 5 Reasons Why B2B Startups Need SOC 2 Compliance
- Top UAE Cybersecurity Conferences in 2022
- 5 Best Tips to Perform a Successful IT Risk Assessment
- The Top Cybersecurity Breaches in the UAE
- Internal Controls and Data Security: Minimize Your Security Risk
- What Is an Executive Summary in Cyber Security Risk Reporting?
- Why is Threat Modeling So Important in 2022?
- The 10 Best Compliance Podcasts You Should Listen To In 2022
- Data Privacy vs. Data Security: What is the Main Difference?
- What Is Risk Mitigation? Success-Driven Strategies & Insights You Need to Know
- Preparing for your SOC 2 Audit - Do’s and Don’ts
- Everything You Need to Know About UK Cyber Essentials
- What Is SOC 2 Automation Software and Why It's Necessary
- Business Impact Assessment vs. Risk Assessment: What's the Difference?
- Examining the Cybersecurity Risks of the Russia-Ukraine Conflict
- The SOC 2 Compliance Checklist for 2022
- The Best of Both Worlds: Why Modern Risk Management Demands a Hybrid Approach
- CMMC v2.0 vs NIST 800-171: Understanding the Differences
- How to Integrate an ESG Framework into Your Risk Management Plan
- Benefits of Automating SOC 2 Compliance and Why Is It Important?
- How Automating Audit Workflows Streamlines the Process
- Everything You Need To Know About The New York Privacy Act 2021
- What is the Massachusetts Data Privacy Law (MIPSA)?
- What Are the Elements of an Effective GRC Program?
- ESG Risk Management: How to Conduct Risk Assessments, Analyze and Prioritize
- How IT Risk Management Impacts Your Organization
- Why Every Business Needs a Cybersecurity Incident Response Plan
- Top Cybersecurity & Third-Party Risk Management Trends to Follow in 2022
- Why Board Members Should care about ESG Compliance Software
- How to Implement a Vulnerability Management Program — and Why You Need One
- How Do You Choose a GRC Platform for Your Company?
- What Does Compliance Automation Enable for Your Business?
- Information Security Risk
- Supply Chain Compliance
- Compliance Automation Software
- Cybersecurity Risk Analysis
- IT Vendor Risk Management
- Cybersecurity Performance Management
- Cybersecurity Incident Disclosure
- Cyber Governance
- ESG Risk Management
- Application Risk Assessment
- Cyber Security Risk Register
- Self-assessment Questionnaire (SAQ)
- POA&M
- Zero Trust Architecture
- RMIS Software
- Vendor Management Policy
- Vendor Assessment
- Audit Trail
- Data Security Controls
- Cloud Security Compliance
- IT Security Policy
- Automated Risk Assessment
- Data Classification Policy
- Data Compliance
- Quantitative Risk Assessments
- Compliance Program
- Controlled Unclassified Information (CUI)
- Compliance Automation
- Cyber Risk Quantification
- Third-Party Risk
- IT Risk Assessment
- IT General Controls
- Information Security Policy (ISP)
- Security Questionnaire
- Integrated Risk Management
- Compliance Reporting
- Compliance Management System
- Last Resources
CIS Controls
June 14, 2021
Secure Controls Framework (SCF)
May 30, 2022
OWASP ASVS
June 14, 2021
CCPA
June 14, 2021
GDPR
June 14, 2021
NY SHIELD Act
June 14, 2021
ISO 27701
June 14, 2021
ISO 27001
June 14, 2021
PCI DSS
June 14, 2021
SOC 2 Type II
June 14, 2021
FFIEC
June 14, 2021