Syndicated Blog

Centraleyes
Risk Management Platform
Centraleyes Feature Review - Automated Risk Register

Risk Register Templates: Enhancing Your Risk Management Strategy

| | Blog, Topic
In a world full of uncertainties, how do you keep your business risks in check?  Today, we’re exploring risk register templates and how they can supercharge your risk management strategy. What is ...
colorado ai act

Colorado New AI Act: Everything you Need to Know

| | Blog, Topic
On May 8, 2024, the Colorado House of Representatives passed SB 205, a landmark law regulating artificial intelligence (AI). This bill, which had already cleared the state Senate on May 3, positions ...
NIST Cybersecurity Framework 2.0 | Centraleyes

Updating Security Metrics For NIST CSF 2.0: A Guide To Transitioning From 1.0 To 2.0

| | Blog, Topic, Uncategorized
The NIST Cybersecurity Framework (CSF) has long served as a cybersecurity cornerstone, offering a structured approach to managing and improving cybersecurity risk. With the release of NIST CSF 2.0, organizations are poised ...
Massive Data Breach Exposes Personal Information of Billions

Massive Data Breach Exposes Personal Information of Billions

| | News & Updates
A data breach at National Public Data, a relatively obscure but widely connected company, has exposed 272 million Social Security numbers. This breach, reminiscent of the 2017 Equifax breach but on an ...
when compliance fails

When Compliance Fails: Eye-Opening Incidents in GRC You Need to Know

| | Blog, Topic
In the world of governance, risk, and compliance (GRC), there’s no shortage of incidents that illustrate what can happen when companies fall short of their compliance responsibilities.  In this blog, we’ll present ...
DORA’s Third-Party Risk Standards in 2024

DORA’s Third-Party Risk Standards in 2024: A Comprehensive Guide

| | Blog, Topic
The digital age has revolutionized the financial sector, making it more efficient and interconnected. However, this transformation has also introduced new risks, particularly from third-party ICT (Information and Communication Technology) providers. Recognizing ...
The Key Components of HRIPA Compliance

The Key Components of HRIPA Compliance

| | Blog, Topic
Data breaches and privacy concerns are all too common today. That’s why the Australian Health Records and Information Privacy Act 2002 (HRIPA) is highly relevant. This legislation ensures that your privacy is ...
Whistle While You Work

Whistle While You Work

| | News & Updates
The DOJ rolled out its Corporate Whistleblower Awards Pilot Program this month. The initiative incentivizes whistleblowers who provide original, non-public information about corporate misconduct. If their tip leads to a DOJ enforcement ...
Methods for Calculating Cybersecurity Risk Scores

7 Methods for Calculating Cybersecurity Risk Scores: A Guide to Risk Analysis

| | Blog, Topic
Cyber risk scores measure the potential impact and likelihood of cyber threats. These scores help organizations prioritize their security efforts, allocate resources efficiently, and communicate risks to stakeholders clearly. It’s important to ...
Delta’s Mirror Moment: A Play of Third-Party Reflection

Delta’s Mirror Moment: A Play of Third-Party Reflection

| | News & Updates
Setting: Two friends, Delta Air and Crowd Strike, sit at a corner table, sipping their drinks and exchanging sharp glances. Delta: (sighing heavily) CrowdStrike, you’ve really put me in a bind with ...

Application Security Check Up