Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is GDPR? Introduction to requirements

What is GDPR? Learn what the General Data Protection Regulation is, who it applies to, key requirements, and how to stay compliant with the EU data privacy law.

article

7.5.2025

Cyber security regulations and frameworks in Belgium 🇧🇪

Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.

article

30.4.2025

What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements

Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.

article

29.4.2025

What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework

Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.

article

29.4.2025

10 things I wish I knew: Starting your ISO 27001 project on the right track

This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.

article

23.4.2025

Understanding NIS2: supervision and penalties of non-compliance

Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).

article

15.4.2025

Comparing EU cybersecurity frameworks: NIS2, GDPR, DORA and more

A comparison of key cybersecurity frameworks in the EU, including NIS2, GDPR, DORA, CRA, and ISO 27001. Learn who they apply to and what they require.

article

10.4.2025

ISO 27001 compliance vs. certification: differences, benefits & which path to choose

Understanding when to pursue ISO 27001 compliance rather than going for certification—or vice versa—hinges on your organizational priorities, resources, and long-term security strategies. Check the differences and learn which path to choose.

article

1.4.2025

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

Cybercriminals target nonprofits’ limited security resources to steal donor data, commit fraud & deploy ransomware. Action is needed—e.g. staff training on #phishing & fraud prevention is crucial to protecting assets & maintaining trust. 🛡️

Go to article at
7.3.2025

Leeds United Supporters Suffer Cyber Attack

⚽️ Leeds United suffered a cyber-attack in February, exposing customer card details. With rising phishing, card skimming & fraud, the sports industry must strengthen #cybersecurity to protect fan data. ⚽️

Go to article at
7.3.2025

Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

👀 What is MFA Fatigue? Attackers flood users with repeated MFA prompts, hoping they’ll approve one out of frustration or confusion—unknowingly granting access. Read how to defend against MFA fatigue, and stay secure! #cyberattack

Go to article at
28.2.2025

Cybersecurity needs a leader, so let’s stop debating and start deciding

💡 When it comes to #cybersecurity, businesses still struggle with ownership. In today’s threat landscape, this is a serious red flag - Cybersecurity is a business function, not just an IT concern.

Go to article at
28.2.2025

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Over 130,000 compromised devices are actively attempting logins using stolen credentials. To detect and mitigate these threats, security teams must prioritize monitoring Non-Interactive Sign-In logs. 🤖 🔐 #cybercrime

Go to article at
28.2.2025

The compliance illusion: Why your company might be at risk despite passing audits

Often organizations treat passing an audit like the finish line, only to let security controls stagnate once the paperwork is signed. Larger breaches show that being “compliant” doesn’t always prevent real-world #cybersecurity threats 🛡️🚨

Go to article at
27.2.2025

A Gold Standard for Compliance: Why ISO 27001 is More Relevant Than Ever 

Ultimately, ISO 27001 isn’t just about meeting compliance checkboxes—it’s a strategic investment in trust, competitive differentiation, and long-term business growth. ISO 27001 is a powerful place to start to improve your #cybersecurity 🛡️

Go to article at
27.2.2025

Why digital resilience is critical to banks

With rising cyber threats and supply chain risks, financial institutions must move beyond prevention and prepare for disruptions. DORA strengthens digital operational resilience to ensure stability and security. 🛡️ #cybersecurity

Go to article at
21.2.2025

Controlling Shadow AI: Protecting Knowledge Management from Cyber Threats

🤖The next frontier of cybersecurity isn’t just about defending networks—it’s about securing AI-driven decision-making and knowledge management. 🚀 Is your organization prepared? #vulnerability

Go to article at
21.2.2025