Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is GDPR? Introduction to requirements

What is GDPR? Learn what the General Data Protection Regulation is, who it applies to, key requirements, and how to stay compliant with the EU data privacy law.

article

7.5.2025

Cyber security regulations and frameworks in Belgium 🇧🇪

Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.

article

30.4.2025

What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements

Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.

article

29.4.2025

What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework

Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.

article

29.4.2025

10 things I wish I knew: Starting your ISO 27001 project on the right track

This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.

article

23.4.2025

Understanding NIS2: supervision and penalties of non-compliance

Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).

article

15.4.2025

Comparing EU cybersecurity frameworks: NIS2, GDPR, DORA and more

A comparison of key cybersecurity frameworks in the EU, including NIS2, GDPR, DORA, CRA, and ISO 27001. Learn who they apply to and what they require.

article

10.4.2025

ISO 27001 compliance vs. certification: differences, benefits & which path to choose

Understanding when to pursue ISO 27001 compliance rather than going for certification—or vice versa—hinges on your organizational priorities, resources, and long-term security strategies. Check the differences and learn which path to choose.

article

1.4.2025

Navigating DORA and NIS2 Compliance for Financial Sector Organisations in the EU

DORA and NIS2 are reshaping cybersecurity in the EU—but many orgs are still unprepared. Compliance isn't just a legal task; it's about building resilience, trust, and readiness for real-world threats. 👻 #cybersecurity

Go to article at
30.5.2025

You'll never guess which mobile browser is the worst for data collection

Which mobile browser collects the most data? 👀 A new Surfshark study ranks the top 10 by data types collected—some grab precise location, financial info, and more. The most popular browsers aren't always the most private. #dataprotection

Go to article at
9.5.2025

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

❤️‍🩹 Healthcare faces rising insider data risks—81% of violations involve regulated health data, often shared via GenAI tools like ChatGPT. DLP policies and approved AI tools help reduce "shadow AI" and improve security. #CyberSecurity

Go to article at
9.5.2025

Top 10 Cloud Security Mitigation Tactics

Cloud threats are evolving fast. 🌩️ Strong IAM, encryption, monitoring, and user training are just a few key tactics to secure your cloud environment and reduce risk. LEt's stay proactive, not reactive. #cybersecurity

Go to article at
9.5.2025

UK shares security tips after major retail cyberattacks

Following recent incidents at top UK retailers, the NCSC urges companies to revisit access controls, helpdesk protocols, and MFA. 🔐 Proactive steps today can prevent major disruptions tomorrow. #vulnerability

Go to article at
9.5.2025

Email Authentication Fails to Keep Pace with AI-Driven Attacks

AI is making phishing emails harder to spot, and despite growing DMARC adoption, many orgs still aren’t enforcing it—leaving them open to spoofing so email remains a weak link. 🔗 #dataprotection

Go to article at
30.4.2025

Mobile security is a frontline risk. Are you ready?

📱 Mobile is now a top attack target—not just a side risk. With phishing rising, sideloaded apps spreading #malware, and outdated devices open to exploits, mobile security needs serious attention. Defenses must match the threat. 🛡️

Go to article at
30.4.2025

Why Startups Must Prioritize Cybersecurity and Compliance

Startups often overlook cybersecurity and compliance while chasing growth—but ignoring them can be costly. A small investment in protection early on can prevent major damage and build long-term trust. 🛡️ ⭐️ #dataprotection

Go to article at
30.4.2025

Compliance Challenges in Cloud Data Governance 

Good read on cloud compliance—highlighting how managing data across borders involves navigating a complex mix of laws, regulations, and industry standards. As cloud adoption grows, so does the need for clear data governance. #cybersecurity

Go to article at
30.4.2025