Ceeyu Blog

Active or passive vulnerability management – what’s the difference and which one is better?

Active and passive scanners are not substitutes for each other, rather, they complement each other. While passive scanners can be used to mo...

March 19, 2023

Five reasons why managing your attack surface is important

Cyber security is an increasingly important issue for organizations of all sizes. A successful attack can result in the loss of sensitive da...

January 23, 2023

In NIS2, Third-Party Security Risk management is the focal point

The 2022 NIS2 directive aims at enhancing cybersecurity in businesses across the European Union. Compared to the 2016 NIS1, NIS2 applies to...

December 13, 2022

The visible vs the invisible digital footprint of a company

Every company and every person connected to the Internet has a digital footprint. Generally, the digital footprint of a company consists of ...

November 14, 2022

How can your digital footprint grow out of control

In today's online reputation realm of social media, cookies, or overcomplicated privacy settings, the digital footprints of any business can...

October 4, 2022

TikTok suffers critical third party data breach

The jury's still out on how this happened, but it's possible that TikTok might have stored all their internal backend source code on Alibaba...

September 20, 2022

How is your organization doing on Gartner's Top 3 Security Trends

In their top security trends for 2022 Gartner identifies the hybrid work environment and the shift to cloud services supporting a distribu...

September 19, 2022

How can a 3rd party platform help your business mitigate cyber risks

Digital footprint has become the target of cyberattacks more and more in recent years.

August 29, 2022

Another technology company bites the data leakage dust

It seems that following a phishing attack on employees, a data leakage occurred at Twilio which may have affected millions of end-users.

August 15, 2022