Centraleyes Resource Center
- Yair Solow Featured on Bugy's Founder Interviews
- Centraleyes Chosen as Global Top 5 Startups of the Year - Interview
- Centraleyes on Cyber Ghost: Interview with Yair Solow
- Spotlight Q&A with Centraleyes at Safety Detectives
- Centraleyes Expands Automated Risk Register To Cover All Enterprise Risk
- New Centraleyes 4th Generation Release Officially Goes Live
- Yair Solow Featured on VPN Mentor
- Yair Solow on CNN
- CyGov Signs a Strategic Agreement with R3 (Spanish)
- Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to Its Board of Directors
- Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure
- Centraleyes Introduces First Automated Risk Register
- Yair Solow Featured on Website Planet
- Trevor Failor named head of sales at CyGov
- CyGov is rebranding its platform as Centraleyes
- Cybersecurity Company Cygov Partners With Risk Management Company Foresight
- CyGov agrees strategic partnership with top 200 MSSP Cybriant
- Cyber Resilience Resource for Businesses Re-Deploying Remotely
- The Four New Pillars of Corporate Protection Yair Solow on InfoSecurity Magazine
- CyGov selected by SixThirty as Top Cyber Security Startup
- Europe's Top Cyber Security Startups
- CyGov Interviewed by MediaSet
- Eli Ben Meir's article in Security Intelligence
- Yair Solow on i24 News
- CyGov Selected by WorldBank
- Eli Ben Meir OpEd in the Houston Chronicle
- Yair Solow and Eli Ben Meir Present at the SparkLabs Demoday 8
- Enhance Your Cyber Maturity With ITSM Integration and Automated Remediation
- Ensure Your Ongoing Compliance With Automatic Framework Reassessment Tasks
- Stay in the Know With a Full Activity Log of Your Assessment Collection
- Add a New Entity to Perform Your Assessment in 10 Seconds
- Quantify Financial Risk With Centraleyes Platform Primary Loss Calculator
- Cover Your Entire Environment With Centraleyes's Risk Application Assessments
- Communicate Cyber Risk With Your Executives in an Intuitive, Beautifully Visualized Board Reporting
- Stay on Top of Your Vendors' Cyber History With In-Depth External Scans
- Automate the Creation and Maintenance of a Risk Register, Saving Hours on Manual Work
- Add a New Framework and Distribute Assessments in Your Organization
- View Your Organization's Risk Scoring Through the NIST Tiering Lens
- Most Intuitive Way for Compliance With the Framework Navigation Tool
- Always Prepared for the Next Task With Automated Remediation
- Effective Team Work With Drag-and-Drop Control Assignment
- Get Real-Time Critical Alerts That are Specifically Relevant to You
- MSSPs Can Manage Multiple Clients Under One Platform
- Onboard a New Vendor in Just 30 Seconds
- Turn Hours of Work Into Seconds with Centraleyes Vendor Risk Profile
- Always Informed with Centraleyes Domain Benchmarking
- CVE Program Gets a Lifeline—But the Real Story Is Just Starting
- Securing AI Agents: A New Frontier in Cybersecurity
- Spain's Massive Power Outage: A Wake-Up Call for Cybersecurity and Grid Resilience
- Mandiant’s M-Trends 2025: Edge Devices Are Now Prime Targets
- Who’s Snooping on Go1 Robot Dogs?
- Deleting DNA Data From 23andMe
- 12 Hours or Else: Hong Kong’s Cybersecurity Explained
- Chainguard “FIPS” Apache Cassandra
- The Cost of Compliance Theater: DoD Contractor Pays $11.2M for False Cybersecurity Certifications
- Federal Agencies Face Hurdles in Zero-Trust Implementation
- Identity Security Just Got a Major Upgrade
- Security Flaw Found in Patient Monitors: No Fix Yet
- PlugX Malware Network Dismantled
- Patch Now or Pay Later: Android 2025 Update
- Netflix Fined €4.75 Million Over GDPR Transparency Issues
- Did Google Just Change the Rules on Privacy in Healthcare?
- Salt Typhoon Campaign: A Wake-Up Call for U.S. Telecoms and National Security
- When Your Coffee Break Faces a Cyber Threat
- CISOs, It’s Time to Insure Your Role—Literally
- Telecom, Airline, and Utilities Move into Highest Cyber-Risk Category, Says Moody’s
- Under the Mask of Copyright: How Phishing Attacks Are Evolving
- New Indicators of Compromise Revealed for Critical FortiManager Vulnerability
- How Attackers are Using EDRSilencer to Fly Under the Radar
- Operation Token Mirrors
- OpenAI Disrupts 20+ Malicious Campaigns Using AI for Cybercrime and Disinformation
- Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security
- Hackers Target Cybersecurity Job Seekers
- UK Data Centres Crowned Critical National Infrastructure
- White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance
- Massive Data Breach Exposes Personal Information of Billions
- Whistle While You Work
- Delta’s Mirror Moment: A Play of Third-Party Reflection
- The Great Cyber Debate: Regulation vs. Innovation
- CrowdStrike Outage
- How is "Materiality" Defined According to the SEC Disclosure Rules?
- Balancing Act: Streamlining Federal Cybersecurity Regulations
- Auto Sales Hit a Cyber Speedbump
- Explainer: The CDK Global Ransomware Attack
- Micro-Managed: AMD Investigates IntelBroker Hack
- Microsoft Puts Recall on Hold
- How to Build a Successful GRC Program to Help Reduce Your Risk Posture
- How to Stay Secure and Compliant in a World of Regulatory turmoil
- Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk
- Flash Webinar: How to Know When it's Time to Build a Risk Management Program
- Enhancing Cyber Risk Management Through the Power of Automation - Boutique Webinar
- Flash Webinar: From Technical to Business Risk - How to Communicate With Your Board
- Flash Webinar: What You Can Learn From the SolarWinds Attack to Lower Your Chances of Being Breached
- Flash Webinar: Supply Chain, 3rd-Party Vendors and the Silent Assassin Among Them
- Flash Webinar: Cyber Risk Management - it Doesn't Have to Be So Painful
- Top 12 Continuous Security Monitoring (CSM) Tools for Proactive Defense
- 10 Best Cyber Risk Management Platforms of 2025
- Why MSSPs Must Prioritize Cyber Risk Quantification in 2025
- Top Cybersecurity Tools for Higher Education: Protecting Institutions
- Top 6 Compliance Management Tools for Financial Services
- Why Compliance Mapping is the Backbone of Risk and Governance Programs
- Decoding EASA Regulation Part-IS: A Comprehensive Guide to Strengthening Aviation Cybersecurity
- Risk Management in Higher Education: Top Challenges and Proven Solutions
- Best 9 Compliance Risk Assessment Tools for 2025
- 9 Methods for Calculating Cybersecurity Risk Scores: A Guide to Risk Analysis
- Top 15 MSSPs to Watch in 2025
- Best 12 SaaS Security Tools to Protect Your Cloud Applications
- ISO 27701 Requirements Explained: How to Enhance Your Privacy Framework
- How Much Does PCI DSS Compliance Cost in 2025?
- The Ultimate ISO 27001 Checklist: Step-by-Step Guide to Simplify Your Compliance Journey
- Best 10 SOC Tools for Security Operations and Threat Detection
- Best 12 PCI Compliance Solutions for Ensuring Compliance in 2025
- 5 Best Cyber Resilience Solutions of 2025
- Mastering the German Federal Data Protection Act (BDSG-New): A Deep Dive
- CMMC Compliance Checklist for 2025: Key Steps and Common Pitfalls to Avoid
- ICFR Best Practices: How to Design and Maintain Strong Financial Controls
- GRC for Building Customer Trust: A Strategic Imperative for Long-Term Success
- PCI DSS Tokenization vs Encryption: Key Differences to Protect Payment Data
- The Full NIST 800 53 Checklist: How to Prepare for an Audit
- Exploring the EU Cybersecurity Certification Scheme: A Guide to Common Criteria
- Cybersecurity Dashboards: Enhancing Security Monitoring and Decision-Making
- The Top 10 AI Compliance Tools of 2025
- The FFIEC’s Origins and Purpose for Banking Industry
- 10 Best ERM Software in 2025: The Complete Guide
- EU Cyber Resilience Act: What You Need to Know
- How Data Visualization Helps Prevent Cyber Attacks
- Types of Risk Assessment Methodologies: Choosing the Right Approach for Your Needs
- NYDFS Cybersecurity Regulation: Dates, Facts and Requirements
- 12 Critical SOC 2 Controls to Support Compliance
- How Does FCPA Compliance Impact Your Business
- New York SHIELD Act: Everything You Need to Know for Compliance
- Common Examples of HIPAA Violations: Understanding Compliance Challenges
- The 13 Best GRC Tools for 2025
- The Top Cybersecurity Breaches in the UAE
- The Goals of Security Compliance
- Cyber Leaders of the World: Chris Lockery, CISO at Help at Home
- Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District
- Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome
- Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors
- Cyber Leaders of the World: Craig Williams, CISO at Secure Data Technologies
- Cyber Leaders of the World: Bill Genovese, CIO Advisory Partner at Kyndryl
- Cyber Leaders of the World: Dr. Brian Callahan, Graduate Program Director & Lecturer at ITWS@RPI, and CISO at PECE
- Cyber Leaders of the World: Chris Grundemann, Research Category Lead for Security and Risk at GigaOm
- Cyber Leaders of the World: Barak Blima, CISO at CHEQ
- Cyber Leaders of the World: Tony Velleca, CEO at CyberProof and CISO at UST
- Cyber Leaders of the World: Rob Black, CEO and Founder of Fractional CISO
- Cyber Leaders of the World: Zachary Lewis, CISO at the University of Health Sciences and Pharmacy in St. Louis
- Cyber Leaders of the World: Dan Wilkins, CISO at the State of Arizona
- Cyber Leaders of the World: Sagar Narasimha, CISO at Amagi
- Cyber Leaders of the World: Seema Sharma, Global Head of Information Security & Data Privacy at Servify
- Cyber Leaders of the World: Shay Siksik, VP of Customer Experience at XM Cyber
- Cyber Leaders of the World: Raz Karmi, CISO at SimilarWeb
- Supplier Performance Risk System (SPRS)
- Audit Exception
- Managed Security Service Provider
- PA-DSS
- Cybersecurity Benchmarking
- Cardholder Data Environment
- C3PAO
- ISO 27001 Annex A Controls
- Trust Center
- ISO 27001 Surveillance Audit
- ISO 27001 Internal Audit
- NACHA Compliance
- Microsoft SSPA
- Information Security Compliance
- Privacy Threshold Assessment
- Incident Response Model
- GRC Maturity Model
- Risk Control Matrix
- HIPAA Employee Training
- Vendor Scorecard
- Threat Intelligence Platform
- Standard Contractual Clauses
- NIS Regulations
- Living-Off-the-Land Attacks
- GRCaaS
- Discretionary Access Control (DAC)
- Covered Defense Information (CDI)
- AI Secure Development
- Approved Scanning Vendor (ASV)
- Law Enforcement Sensitive (LES)
- Content Delivery & Security Association
- Report on Compliance (ROC)
- OT Cyber Risk Framework
- Unified Privacy Framework
- Data Subprocessor
- Threat-Based Risk Assessment
- Semi-Quantitative Risk Assessment
- Vulnerability-Based Risk Assessment
- Risk Management Strategy
- Authorization to Operate (ATO)
- What Should Be Included in a Security Policy?
- What is the first step of PCI DSS compliance?
- What's the Difference Between TX-RAMP, StateRAMP, and FedRAMP?
- What are the ISO Standards for AI
- What’s the difference between NIST 800-53 and NIST 800-171?
- Which AI Compliance frameworks can I choose?
- What is the difference between cloud governance and cloud compliance?
- What are the types of compliance risk?
- What are the benefits of continuous risk management?
- What is the difference between risk assessment and risk analysis?
- What are the Benefits of cyber risk quantification?
- How to Achieve Continuous Compliance?
- How do you implement continuous controls monitoring?
- What is a maturity assessment process?
- What are the different types of compliance management tools?
- What are the Differences Between Internal and External Penetration Testing?
- What is the difference between proactive and reactive risk management?
- Why is a data retention policy important?
- What is the operational risk management process?
- How to implement the COSO framework?
- How do you perform a cyber security risk assessment?
- How to develop an enterprise risk management framework?
- How do you respond to a security questionnaire?
- What are the main steps in the threat modeling process?
- What exactly is considered PHI according to HIPAA?
- What does the PCI Compliance Auditor Look At?
- How to Detect and Prevent Data Leakage?
- What are the Challenges Associated with Cloud Security Management?
- How Many Techniques Are There in MITRE Att&ck?
- What Are the Benefits of Conducting a Risk Assessment?
- What are the categories of controls in ISO 27001?
- How Does ABAC Differ From Other Access Control Models?
- What Does a Compliance Management System Look Like?
- What Are the NIST CSF Implementation Tiers?
- What is the Purpose of Compliance Attestation?
- How do I become NIST 800-171 compliant?
- Why are the three rules of HIPAA necessary?
- What are the seven categories of risk?
- What are the Six Types of Vulnerability Scanning?
- Which are the most important compliance frameworks?
Resources | News & Updates
Whistle While You Work
The DOJ rolled out its Corporate Whistleblower Awards Pilot Program this month. The initiative incentivizes whistleblowers who…
Delta’s Mirror Moment: A Play of Third-Party Reflection
Setting: Two friends, Delta Air and Crowd Strike, sit at a corner table, sipping their drinks and…
The Great Cyber Debate: Regulation vs. Innovation
As the 2024 presidential election draws near, the candidates’ positions on cybersecurity and tech regulation will likely…
CrowdStrike Outage
On July 19, 2024, CrowdStrike released an update intended to beef up security on Microsoft Windows systems.…
How is "Materiality" Defined According to the SEC Disclosure Rules?
Several auto dealers affected by the CDK breach have felt compelled to notify the SEC, indicating that…
Balancing Act: Streamlining Federal Cybersecurity Regulations
A new bipartisan bill, the Streamlining Federal Cybersecurity Regulations Act, introduced by Senators Gary Peters (D-Mich.) and…
Auto Sales Hit a Cyber Speedbump
A recent cyberattack has put a speed bump in the path of automakers like Ford and General…
Explainer: The CDK Global Ransomware Attack
CDK Global, a leading software vendor, provides critical applications and services to nearly 15,000 automotive dealer locations…
Micro-Managed: AMD Investigates IntelBroker Hack
AMD is investigating a potential data breach after a notorious hacker, known as IntelBroker, announced they were…
Microsoft Puts Recall on Hold
Microsoft has announced a delay in the rollout of its controversial AI-powered Recall feature for Copilot+ PCs.…
Snowflake Breach Snowballs
In a concerning turn of events, a breach in Snowflake’s cloud storage system has resulted in a…
Game Over? Law Enforcement Plays Hardball in Operation Endgame
In what Europol has labeled the most significant crackdown against botnets to date, Operation Endgame saw law…
Cybersecurity in Sports: A New Arena for Risk Management
In the high-stakes world of professional sports, the action isn’t just on the field. Behind the scenes,…
Boeing's Sky-High Ransomware Refusal
A grand jury indictment in New Jersey charged Russian national Dmitry Yuryevich Khoroshev with orchestrating a litany…
What was Behind the Change Healthcare Breach that Shook the Healthcare Industry?
In a gripping Senate Finance Committee hearing, Change Healthcare CEO Andrew Witty disclosed that data stolen in…
Cisco Raises Concerns Over Surge in Brute-Force Attacks Targeting VPN and Web Services
Cisco has sounded the alarm on a widespread increase in brute-force attacks targeting various devices, including Virtual…
Bipartisan Proposal Sparks Hope for American Privacy Rights Act
A federal privacy law all but stalled in congress since 2022. But this week saw a sudden…
Microsoft Responsible for Made-in-China Hack that Targeted US Officials
A US government-backed investigation has determined that a China-sourced hack last year that infiltrated Microsoft’s networks and,…
AI Gets an Endorsement from Coalition
Coalition, a leader in cyber insurance, has added a positive endorsement for artificial intelligence (AI) to its…
NIST NVD "Under Construction"
In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024,…
TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks
Tuta Mail introduced TutaCrypt, a protocol engineered to bring email encryption into the post-quantum era. Tuta Mail…
9.8/10 Severity Flaw in Team City- Patch Now!
Hackers have recently seized upon a critical-severity authentication bypass vulnerability, CVE-2024-27198, within TeamCity On-Premises. JetBrains has swiftly…
Blackcat Claims Responsibility for the UnitedHealth Change Breach
UnitedHealth’s subsidiary, Change Healthcare, found itself at the epicenter of a cyber storm when it fell victim…
US Gov's Cyber Survival Guide for Water Utilities
In a recent move to bolster the nation’s water utilities against cyber threats, the US government has…
Safeguarding Elections Amidst the Deepfake Deluge
As we gear up for the 2024 U.S. presidential election, deepfake technology looms large, presenting a formidable…
Faking the Figures (and the Faces): Deepfake Financial Frauds
The proliferation of deepfake creation software on the Dark Web is fueling a surge in AI-assisted financial…
Trello Got a Scrape
This week, a threat actor exploited an exposed Trello API, linking private email addresses with Trello accounts.…
Advisory Issued for Androxgh0st Malware
CISA and the FBI have issued a cybersecurity advisory regarding the escalating threat of AndroxGh0st malware. This…
X Marks the Spot: Mandiant and SEC's Security Sway on Twitter
In a week marked by digital discord, two influential Twitter accounts found themselves in the crosshairs of…
Quantum Quandary: Navigating the Path to Unbreakable Encryption
The rise of quantum computing presents a profound challenge to data security. Termed ‘Q-Day,’ the point at…