Syndicated Blog

Centraleyes
Risk Management Platform
Cyber Risk Management as a Best Practice: Benefits to Financial Firms

Cyber Risk Management as a Best Practice: Benefits to Financial Firms

| | Blog, Topic
According to BitSight,  the financial services industry is a high-value target for threat actors. Firms in this sector are 300 times more likely to be targeted by a cyberattack and over 50% ...
Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Please tell us about yourself, your background, and your journey of becoming a CISO for the Dallas Independent School District. I began my journey as a service member in the Army, serving ...
Made-In-China Hack Infiltrates the US Government

Made-In-China Hack Infiltrates the US Government

| | News & Updates
A hacking campaign, which began in mid-May, saw Chinese hackers infiltrating US government email accounts, including those of federal agencies such as the State Department and the Department of Commerce. While the ...
Selecting the Best Cyber Risk Quantification Models for Your Organization

Selecting the Best Cyber Risk Quantification Models for Your Organization

| | Blog, Topic
Quantitative risk analysis refers to a numeric projection of the total impact of a given risk on business objectives. A risk quantification model is a tool or approach that helps organizations understand ...
Security Audit Benefits for Small Businesses

Security Audit Benefits for Small Businesses

| | Blog
What is a Security Audit? A cyber security audit is like a health checkup for an organization’s digital ecosystem. It involves a meticulous examination of its systems, networks, and processes to identify ...

CJIS

| | Compliance
What is the CJIS framework? The CJIS (Criminal Justice Information Services) framework is a comprehensive set of security policies and guidelines established by the Federal Bureau of Investigation (FBI) in the United ...
Benefits of Information Security Automation

Benefits of Information Security Automation

| | Blog, Topic
What is Information Security Automation? Security automation refers to the use of technology and tools to automate recurring functions in the field of information security such as detecting, investigating, and remediating cyber ...
EU-U.S. Data Privacy Framework: Is Adequate Good Enough?

EU-U.S. Data Privacy Framework: Is Adequate Good Enough?

| | News & Updates
The European Union has approved a new agreement regarding the privacy of individuals’ personal information transmitted across the Atlantic, in an effort to address European concerns about surveillance by American intelligence agencies ...
Crafting a Successful Cybersecurity Risk Management Strategy

Crafting a Successful Cybersecurity Risk Management Strategy

| | Blog, Topic
In a world where cyber risks lurk in the dark shadows of our networks, one thing is crystal clear. You need a cybersecurity risk management strategy in place to better understand your ...
Anonymous Sudan Or Anonymous Russia?

Anonymous Sudan Or Anonymous Russia?

| | News & Updates
Anonymous Sudan gained notoriety with its distributed denial of service (DDoS) attacks, targeting Microsoft in June.  Earlier this year, the group was linked to a string of cyber attacks against Israel, Sweden, ...