Ceeyu.io (@ceeyu_io) 's Twitter Profile
Ceeyu.io

@ceeyu_io

Ceeyu identifies IT and network vulnerabilities for companies and their supply chain (TPRM) by combining automated scans (ASM) with questionnaire-based audits

ID: 918395578106699776

linkhttps://www.ceeyu.io calendar_today12-10-2017 08:39:03

20 Tweet

17 Followers

5 Following

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

#Ceeyu has been selected, together with #Awingu, #Toreon, #VUB, #LSEC, and #VLAIO, to work on the innovative #APAX cybersecurity project. linkedin.com/feed/update/ur…

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

Working with suppliers includes managing the risks they pose on your environement. Learn more on where to start this process! #cybersecurity #thirdpartyriskmanagement #riskmanagement #ceeyu buff.ly/3rYrTNj

Working with suppliers includes managing the risks they pose on your environement. Learn more on where to start this process!
#cybersecurity #thirdpartyriskmanagement #riskmanagement #ceeyu
buff.ly/3rYrTNj
Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

How to set up a TPRM process. What to include, and how it fits in your risk management process. Know we can also help you with setting up, and prodiving a supportive platform, for your TPRM process! #riskmanagement #cybersecurity #thirdpartyriskmanagement buff.ly/3IqThcF

How to set up a TPRM process. What to include, and how it fits in your risk management process. Know we can also help you with setting up, and prodiving a supportive platform, for your TPRM process!
#riskmanagement #cybersecurity #thirdpartyriskmanagement

buff.ly/3IqThcF
Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

To all #cyber enthusiasts out there: In this Ceeyu blog post we'd like to help demystify the relationship between three of the most important #cybersecurity processes. buff.ly/3v2HbCy

To all #cyber enthusiasts out there:  In this Ceeyu blog post we'd like to help demystify the relationship between three of the most important #cybersecurity processes.

buff.ly/3v2HbCy
Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

In this new Ceeyu blog post we hope to convince you that as the cliché goes Attack Surface Management #asm is a journey, not a destination. bit.ly/3ulCkKD #riskmanagement #cybersecurity #attacksurfacemanagement #attacksurface #asm #ceeyu

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

When a supplier stops responding to an assessment, or is not responding at all, what can you do? Find out how to handle this situation and keep your third party risk management program running smoothly. bit.ly/3wS2S97 #thirdpartyriskmanagement #tprm #riskmanagement

When a supplier stops responding to an assessment, or is not responding at all, what can you do? Find out how to handle this situation and keep your third party risk management program running smoothly.
bit.ly/3wS2S97
#thirdpartyriskmanagement #tprm #riskmanagement
Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

Your organization's digital footprint can expose a lot of sensitive information and make you prone to exterrnal attacks. Read more about why your digital footprint matters here: bit.ly/3uZe1nd #riskmanagement #thirdpartyriskmanagement #cybersecurity #digitalfootprint

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

The purpose of this post is to introduce the concept of subdomain enumeration and provide a list of tools and techniques for performing it. Do comment on this post with your own techniques and tools and we'll add them to the blog! bit.ly/3835UO6

The purpose of this post is to introduce the concept of subdomain enumeration and provide a list of tools and techniques for performing it.

Do comment on this post with your own techniques and tools and we'll add them to the blog!

bit.ly/3835UO6
SecurityWeek (@securityweek) 's Twitter Profile Photo

Hackers leak data from Australian health insurer Medibank on dark web - securityweek.com/hackers-leak-a… - securityweek.com/hackers-leak-a…

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

''43% of companies have experienced a #databreach in the last year'' The cause is more often ''disgruntled or careless employees who have access to #sensitivedata and choose to misuse it'' The result can be ''Loss of #customertrust and loyalty'' infonettc.org/data-breach-in…

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

🆕from Ceeyu: 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗶𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗲𝗱 𝘄𝗶𝘁𝗵 𝗔𝘁𝘁𝗮𝗰𝗸 𝗦𝘂𝗿𝗳𝗮𝗰𝗲 𝗺𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁. Why is this interesting? Read the release! ceeyu.io/company/news/p…

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

NEW BLOGPOST ALERT: we summarized the 6 steps to get started with Third Party (Security) Risk Management #TPRM ceeyu.io/resources/blog…

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

NEW RELEASE ALERT... we've added loads of new features to our free account. Why not give a try? It's free... app.ceeyu.io/login

Ceeyu.io (@ceeyu_io) 's Twitter Profile Photo

Searching the DNS for keywords (to find illegal use or shadow IT) is not that easy. But here's a how-to! ceeyu.io/resources/blog…