Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Information Security Risk Management: A Step-by-Step Process

Manage information security risks with a clear step-by-step process, from asset identification to monitoring, essential for navigating growing cybersecurity threats.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.

article

8.3.2024

Top information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how ISO 27001 and NIS2 relate, how they differ, and why organizations often address them together for stronger cybersecurity and compliance.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack

💻 Research underscores the #vulnerability of cloud-managed IoT devices and highlights the critical need for strong authentication, secure communication protocols, and proactive patch management to protect against similar threats. 🌧️

Go to article at
20.12.2024

Three random words or #thinkrandom

What is hashing? Protect yourself by using long, random passwords with special characters. It makes brute-forcing exponentially harder, keeping your accounts safer. 🔐 #cybersecurity

Go to article at
20.12.2024

We must adjust expectations for the CISO role

A recent survey reveals 99% of CISOs are concerned about job security following a breach, with 77% extremely concerned. 📈 #Cybersecurity is a team effort—let’s make it one.

Go to article at
13.12.2024

Phishers Nabbed in International Sting

Belgian and Dutch authorities, as a coordination with Europol and Eurojust, have taken down a #phishing gang responsible for multimillion-euro financial fraud across Europe. 🌍 📞

Go to article at
13.12.2024

Krispy Kreme Cyber Attack Disrupted Online Ordering in the US

🍩 US-based doughnut chain has recently experienced a #cyberattack, disrupting online ordering. While in-store purchases and daily deliveries remain unaffected, the incident highlights growing cybersecurity threats. 🛡️

Go to article at
13.12.2024

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Second-hand smartphones are a great way to access premium technology affordably but they come with #cybersecurity risks like outdated software, malware, or missing refurbishment checks. 📲 👀

Go to article at
13.12.2024

Deepfake attacks occur every five minutes

Cybercriminals are leveraging AI to scale fraud to unprecedented levels, as revealed by Entrust's latest report. Organizations must prioritize proactive strategies to counter these emerging threats.🚨 #cybercrime

Go to article at
13.12.2024

Malware delivered via malicious QR codes sent in the post

Cybercriminals are sending physical letters with malicious QR codes, tricking recipients into downloading #malware disguised as a weather app. Don't scan suspicious QR codes or download apps outside official app stores. 📲

Go to article at
13.12.2024

Ford rejects breach allegations, says customer data not impacted

While the allegedly leaked data isn’t highly sensitive, it could still enable phishing and social engineering attacks. Be cautious of unsolicited messages or requests for additional information. 🚙 🛡️ #cybercrime

Go to article at
13.12.2024