Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

article

25.10.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn what is the new EU NIS2 directive, why the original NIS was not enough and how it affects your company's compliance requirements.

article

1.8.2023

SOC 2: Working towards compliance

With the help of SOC 2, organisations can provide proof of effectively implemented controls and the use of best practices to protect the data to their customers and stakeholders, which may help to build trust.

article

31.7.2023

Personnel information security training and guidelines in Cyberday

Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.

article

13.6.2023

Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure

Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.

article

13.6.2023

A Fifth of UK Enterprises “Not Sure” If NIS2 Applies

A recent study reveals that 22% of UK organizations are unsure if the NIS2 applies to them.💡 As compliance isn’t optional. UK enterprises must act swiftly to align with NIS2 to avoid fines and disruptions. #cybersecurity

Go to article at
13.12.2024

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information

🛍️ Fake websites mimicking trusted brands offer bogus discounts to trick users into entering their cardholder data. The campaign highlights the importance of vigilance during the holiday shopping season.🎄 #phishing

Go to article at
13.12.2024

Exploring the Security Risks of VR and AR

As immersive technologies like VR and AR gain traction across industries, they bring transformative potential—and complex security challenges. To leverage VR and AR effectively, a proactive security strategy is essential. 🧑‍💻 #dataprotection

Go to article at
13.12.2024

The changing face of identity security

🔒 While user security is crucial, attackers also exploit overlooked identities of devices, applications, and service accounts. These can be high-value targets, often granting attackers extensive access if left unmonitored. 🕵️‍♂️ #privacy

Go to article at
13.12.2024

Amazon confirms employee data breach after vendor hack

Amazon confirmed a data breach impacting its employee contact info following the attacks in 2023. Incident underscores the need for robust third-party security practices as cyber threats continue to target enterprise ecosystems.🚨 #cyberattack

Go to article at
13.12.2024

Machine Identities Outnumber Human Ones: 69% of Companies Face Rising Security Risks”

Research states that many organizations now manage more machine identities than human ones 🤖 Automated, cloud-based solutions are essential to protect data, reduce risk, and support compliance in today’s digital landscape. #vulnerability

Go to article at
13.12.2024

Why AI-enhanced threats and legal uncertainty are top of mind for risk executives

Gartner’s latest report identifies AI-enhanced malicious attacks as the leading emerging enterprise risk for the third consecutive quarter, with new risks around IT vendor reliability and regulatory uncertainty rising to prominence. 📊 #cybersecurity

Go to article at
13.12.2024

Fry Another Day: The Hidden Surveillance Powers of Smart Appliances

Could the airfryer be listening? 👀 Some smart devices, such as TVs and air fryers, can demand permissions that go beyond their core functionality. It's wise to review app permissions and limit data sharing to protect privacy. #privacy

Go to article at
13.12.2024

Suspect behind Snowflake data-theft attacks arrested in Canada

With data breaches impacting millions, this case underscores the crucial need for robust security practices like MFA #Cyberattack

Go to article at
13.12.2024