Ceeyu Blog

Ceeyu UI

Is ISO 27001 enough for NIS2 compliance?

Over the years, as cybersecurity has become an increasingly important area of focus in IT, many medium to large companies have obtained ISO ...

February 20, 2024

Ceeyu UI

NIS2: Essential entities vs Important entities, what’s the difference?

The impact of NIS2 for essential and important entities is not much different when it comes to implementing controls to comply, as they are ...

December 11, 2023

Ceeyu UI

Will your company be subject to NIS2?

EU countries have until Oct. 17, 2024, to transpose their measures into national legislation, after which NIS2 will formally replace NIS1. ...

November 7, 2023

Ceeyu UI

Improving third-party risk management: The power of compact questionnaires

When it comes to third-party risk management, precision and relevance take precedence over completeness. This will become even more importa...

October 6, 2023

Ceeyu UI

How to search for keywords in hostnames, domain names and URLs

Regularly checking whether your company name (or registered product brand names) appear in domain names is a healthy exercise to detect two ...

September 4, 2023

Supply chain risk management with Ceeyu

Getting started with third-party security risk management

Setting up a TPRM program may be a daunting task to get started with. In this blogpost, we've summarized the steps to take to get started w...

June 19, 2023

Ceeyu email authentication

Common errors in implementing email authentication that are causing your legitimate emails to not be delivered

DKIM, DMARC and SPF are important email authentication protocols that protect domains from being used for phishing and spamming attempts. Ho...

April 27, 2023

Pen testing or attack surface management

Attack Surface Management or Penetration testing, which one do I need?

Both penetration testing and attack surface management solutions are proactive cybersecurity measures that give customers visibility into ri...

March 29, 2023

Active vulnerability scanning by Ceeyu

Active or passive vulnerability management – what’s the difference and which one is better?

Active and passive scanners are not substitutes for each other, rather, they complement each other. While passive scanners can be used to mo...

March 19, 2023