Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is a vCISO? Understanding the role of virtual CISO

What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.

article

12.6.2025

What is a modular cyber security framework and why they are essential for consultants

Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.

article

12.6.2025

Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up

This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.

article

11.6.2025

Kicking Off a Summer of Innovation at Cyberday

This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.

article

10.6.2025

What is CRA? Introduction to Cyber Resilience Act requirements

What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.

article

2.6.2025

NIS2 delays, healthcare breaches & improved Trust Center: Cyberday product and news summary 5/2025 🛡️

This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.

article

30.5.2025

End of hourly billing: why value-based pricing works for compliance consultants

Hourly billing is fading fast in compliance consulting. Learn why value-based pricing better aligns incentives, boosts earnings, and how compliance consultants can transition effectively.

article

26.5.2025

What is an ISMS? A guide to information security management systems

Learn what ISMS is, why it matters, and how to implement an ISMS step-by-step. See how ISO 27001 and NIS2 fit into your information security management system.

article

14.5.2025

FBI confirms $16.6 billion losses to cyber-crime in 2024

📝 The FBI reports $16.6B lost to cybercrime in 2024, with ransomware surging and elderly victims increasingly targeted. Fraud tops the list—awareness, MFA, and strong cyber hygiene are more vital than ever. #ransomware

Go to article at
25.4.2025

Understanding 2024 cyber attack trends

Report shows: Financial services were most targeted (17.4%) and exploits & stolen credentials topped initial access methods. The hybrid attack surface demands proactive, integrated defenses. 🛡️ #cybersecurity

Go to article at
25.4.2025

Who needs phishing when your login's already in the wild?

Stolen credentials have officially overtaken phishing as the second most common way attackers gain access to systems. One clear takeaway? MFA is no longer optional, but essential to protect against threats. #phishing 🎣

Go to article at
25.4.2025

Navigating Regulatory Shifts & AI Risks

2025 is already reshaping #cybersecurity—with AI and global regulations leading the charge. From NIS2’s steep compliance demands and DORA’s resilience testing for financial firms, the pressure is on and compliance is no longer a checkbox. ✅

Go to article at
25.4.2025

America's cyber defenses are being dismantled from the inside

Eye-opening: #cybersecurity is not optional. It’s foundational to digital trust, both nationally and globally. These political decisions don't just impact the US — they ripple out to affect the entire world’s cyber resilience. 🛡️🌍

Go to article at
25.4.2025

Strategic AI readiness for cybersecurity: From hype to reality

🤖 AI readiness means aligning with business goals, securing clean data, building scalable infrastructure, ensuring ethical use, and fostering human-AI collaboration. #cybersecurity

Go to article at
17.4.2025

Why Shutting Down Systems After a Cyberattack is Not Recommended

During a #cyberattack, shutting systems down may do more harm than good. — it can erase evidence, hinder recovery, and spread malware. Instead create a plan to isolate, contain, and respond strategically.

Go to article at
17.4.2025

The State of Human Risk: Governance and Compliance

Human risk is the #1 priority: 95% use AI to defend against attacks/insider threats, but 55% lack strategies for AI-driven threats. AI is a force multiplier, but human risk remains the wild card. #vulnerability

Go to article at
17.4.2025

From ISO to NIS2 – Mapping Compliance Requirements Globally

🛡️ NIS2 is redefining #cybersecurity compliance. Leaders must align ISO 27001 with legal mandates, foster agile governance, and turn regulation into a strategic advantage: Read our ebook on the topic 📚 www.cyberday.ai/ebook

Go to article at
17.4.2025