Ceeyu Blog

Attack Surface Management vs. Vulnerability Scanning vs. Penetration Testing

Learn the difference between Attack Surface Monitoring, Vulnerability Scanning, and Penetration Testing.

February 15, 2022

How Procurement, Risk Management and TPRM can collaborate against cyber risks

You might have heard about the friendship between the Procurement and Risk Management(RM) departments. TPRM or third party risk management i...

January 26, 2022

Why security ratings matter

Security rating platforms produce a clear view of the vulnerability exposure and overall security posture. The goal is to help manage IT sec...

January 8, 2022

How critical and non-critical third parties have an impact on your organization's TPRM

In an average organization, a considerable part of work is outsourced to vendors and suppliers (or third-parties). Third party risk manageme...

December 19, 2021

How remote connectivity and digital transformation impact your organization's security

As organizations rush to become more digital due to the global pandemic, they increase their exposure on the Internet

December 9, 2021

Volkswagen suffered a data breach through a third party

A data breach at a Volkswagen vendor has impacted millions of customers and prospective car purchasers across North America.

November 24, 2021

Assessing the risks of your third parties, part 2: setting up a third party risk management process (TPRM)

How to set up a TPRM, or third party risk management, process. What to include, and how it fits in your risk management process.

November 10, 2021

Assessing the risks of your third parties, part 1: an introduction.

Managing the risks of working with third parties go far beyond some shared assets on your digital footprint.

October 26, 2021

How to check and maintain a view on the security and risk exposure of your digital footprint

How to continuously monitor the cyber security posture of your digital footprint.

October 3, 2021