Ceeyu Blog

Ceeyu UI

Does NIS2 also apply to companies regulated under DORA?

Does NIS2 also apply to companies covered by the DORA? If so, which subject is covered by which regulation? What is the difference and where...

November 13, 2024

Ceeyu UI

Is ISO 27001 enough for DORA?

This article explains the differences and overlaps between DORA and NIS2 and how ISO 27001, the main cybersecurity standard, makes a company...

April 25, 2024

Ceeyu UI

Is ISO 27001 enough for NIS2 compliance?

Over the years, as cybersecurity has become an increasingly important area of focus in IT, many medium to large companies have obtained ISO ...

February 20, 2024

Ceeyu UI

NIS2: Essential entities vs Important entities, what’s the difference?

The impact of NIS2 for essential and important entities is not much different when it comes to implementing controls to comply, as they are ...

December 11, 2023

Ceeyu UI

Will your company be subject to NIS2?

EU countries have until Oct. 17, 2024, to transpose their measures into national legislation, after which NIS2 will formally replace NIS1. ...

November 7, 2023

Ceeyu UI

Improving third-party risk management: The power of compact questionnaires

When it comes to third-party risk management, precision and relevance take precedence over completeness. This will become even more importa...

October 6, 2023

Ceeyu UI

How to search for keywords in hostnames, domain names and URLs

Regularly checking whether your company name (or registered product brand names) appear in domain names is a healthy exercise to detect two ...

September 4, 2023

Supply chain risk management with Ceeyu

Getting started with third-party security risk management

Setting up a TPRM program may be a daunting task to get started with. In this blogpost, we've summarized the steps to take to get started w...

June 19, 2023

Ceeyu email authentication

Common errors in implementing email authentication that are causing your legitimate emails to not be delivered

DKIM, DMARC and SPF are important email authentication protocols that protect domains from being used for phishing and spamming attempts. Ho...

April 27, 2023