Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

article

6.3.2025

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

article

4.3.2025

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

article

27.2.2025

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

article

18.2.2025

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

article

13.2.2025

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

article

6.2.2025

Most important documents in ISO 27001 certification audit

The ISO 27001 standard does specifically define some key documents, which need to be gathered together and be easily shareable e.g. for the auditor. In this blog, we'll present these most important documents for an ISO 27001 certification audit.

article

30.1.2025

NIS2 & national implementation: which local NIS2 laws are available in Cyberday?

EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.

article

23.1.2025

Starbucks Devs Leave API Key in GitHub Public Repo

One misstep from developers at Starbucks left exposed an API key that could be used by an attacker to access internal systems and manipulate the list of authorized users. [...]

Go to article at
15.5.2020
Cloud Storage Misconfiguration

Why Third-Party Security is Critically Important in 2020

The new year has only just begun, and many CISOs and compliance professionals are making third-party risk management a priority. Similar to how those who never received flu shots may suddenly decide to vaccinate during a particularly bad flu season, companies that never had a formal third-party security process are now focusing attention on how to create and implement one.   The post Why Third-Party Security is Critically Important in 2020 appeared first on Security Boulevard.

Go to article at
15.5.2020
Supply Chain Attacks

CEOs quit social media to keep them secure | Avast

Cyber threats now command the corporate sector’s full attention. The post CEOs quit social media to keep them secure | Avast appeared first on Security Boulevard.

Go to article at
15.5.2020
Business-Email-Compromise,CyberNow

Visa's plan against Magecart attacks: Devalue and disrupt

Beginning last summer, Visa begun throwing considerable resources at combating Magecart -- a type of attack were cybercriminals hack into an online store to plant malware that collects payment card data as users enter personal details in checkout forms. Speaking to ZDNet in a phone interview this week, Visa Senior Director of Payment Systems Intelligence David Capezza says Visa's strategy against Magecart groups is to "devalue and distrupt." Through this approach Capezza says Visa aims to devalue the data attackers can steal from online stores, and then disrupt existing operations and prevent future attacks. Visa's plan to devalue payment card data involves the rollout of new technologies like the Visa Token Service and Click To Pay systems. The Visa Token Service is a new payment mechanic through which payment card numbers and details are replaced by a token. However, as Visa and its partners on the payments market are rolling this new checkout experience to a broader audience, Visa's security team has also been spending its time disrupting existing Magecart operations as much as possible.

Go to article at
15.5.2020
Supply Chain Attacks

Understanding The Ripple Effect: Large Enterprise Data Breaches Threaten Everyone

Go to article at
15.5.2020
CyberNow

Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

Marriott International has experienced their second data breach

Go to article at
15.5.2020
Employee Negligence

Texas bank attacked with DoppelPaymer ransomware — attackers’ report

It’s getting uglier out there.  Both Maze Team and the DoppelPaymer ransomware teams seem to be attempting to increase...

Go to article at
15.5.2020
Ransomware

Most IT leaders believe remote workers are a security risk

57 percent of UK IT decision makers still believe that remote workers are a security risk, and that they will expose their organization to the threat of a data breach, according to a survey by Apricorn. This figure has inclined steadily from 44 percent in 2018 and 50 percent in 2019. The rise could reflect a corresponding increase in the number of remote workers, or an enhanced awareness of the risks of doing so as … More → The post Most IT leaders believe remote workers are a security risk appeared first on Help Net Security.

Go to article at
15.5.2020
Employee Negligence

T-Mobile Suffers a Data Breach, Again

T-Mobile has begun notifying customers of a security breach that might affect an undetermined number of them, possibly revealing their names and addresses, phone numbers, account numbers, rate plans and features, and billing information. Wireless carriers are a prime target for hackers because they hold large databases of customers and data that command a high […] The post T-Mobile Suffers a Data Breach, Again appeared first on Security Boulevard.

Go to article at
15.5.2020
Illegal Personal Data Processing