Syndicated Blog

Centraleyes
Risk Management Platform
Best Compliance Automation Tools

8 Best Compliance Automation Tools: How to Choose

| | Blog, Topic
What is Compliance Automation? Compliance automation is like finding an underground tunnel through a (literal) mountain of paperwork and manual processes. Suddenly, the daunting task of aligning processes with requirements and preparing ...
AI Gets an Endorsement from Coalition

AI Gets an Endorsement from Coalition

| | News & Updates
Coalition, a leader in cyber insurance, has added a positive endorsement for artificial intelligence (AI) to its cyber insurance plans for the US and Canada. The endorsement expands the definition of a ...

ISO 42001

| | Compliance, security
What is ISO 42001 (AI)? Artificial intelligence (AI) has emerged as a transformative technology, imbuing machines with human-like intelligence to perform tasks across various domains. However, with its exponential growth comes a ...
NIST NVD “Under Construction”

NIST NVD “Under Construction”

| | News & Updates, Uncategorized
In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024, a prominent notice has adorned the NVD’s main page, signaling disruptions in vulnerability management. It ...
The Best 10 Vendor Risk Management Tools

The Best 10 Vendor Risk Management Tools

| | Blog, Topic
Let’s discuss an acronym reshaping the business world: Vendor Risk Management, or VRM. Once an abbreviation that few knew the meaning of, VRM is now a basic component of responsible business processes ...
Best 8 Vulnerability Management Tools for 2024

Best 8 Vulnerability Management Tools for 2024

| | Blog, Topic
How’s your vulnerability management going? Is it effective? Or perhaps you’re doubting yourself, unsure whether your organization is protected against vulnerability-based attacks. Let’s explore how you can enhance your vulnerability management strategy ...
Patient Data Post-Change Healthcare Breach

Protecting Patient Data Post-Change Healthcare Breach

| | Blog, Topic
The ransomware attack on UnitedHealth’s Change Healthcare subsidiary last month demonstrated how appealing the data-rich US healthcare industry is to hackers, how devastating the consequences can be, and how sophisticated cybercriminals are ...
Ensuring Business Resilience: Integrating Incident Response and Disaster Recovery Plans

Ensuring Business Resilience: Integrating Incident Response and Disaster Recovery Plans

| | Blog, Topic
In a world marked by the tumultuous waves of the Russia-Ukraine conflict, escalating tensions in the Middle East, disruptions in the Red Sea region, and pivotal elections in many countries, the operational ...
Understanding the Key Updates in NIST Cybersecurity Framework 2.0

Understanding the Key Updates in NIST Cybersecurity Framework 2.0

| | Blog, framework
When the guys at the National Institute of Standards and Technology (NIST) released the inaugural Cybersecurity Framework in February 2014, it did not include a batch of questions that were almost certainly ...
What's in the NIST Privacy Framework 1.1?

What’s in the NIST Privacy Framework 1.1?

| | Blog, framework
The National Institute of Standards and Technology (NIST) plans to update the Privacy Framework to Version 1.1. This announcement comes four years after the release of the original framework in January 2020 ...