Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Most important documents in ISO 27001 certification audit

The ISO 27001 standard does specifically define some key documents, which need to be gathered together and be easily shareable e.g. for the auditor. In this blog, we'll present these most important documents for an ISO 27001 certification audit.

article

30.1.2025

NIS2 & national implementation: which local NIS2 laws are available in Cyberday?

EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.

article

23.1.2025

ISO 27001 certification: What happens in the certification audit?

Learn about ISO 27001 certification audits, including the process, stages, and what auditors evaluate. Find out how to prepare and what to expect.

article

22.1.2025

What is ISO 27001? Intro to the global information security gold standard.

Whether you're new to ISO 27001 or looking to strengthen your current practices, this post will walk you through its essentials, why it matters, and how it can improve your approach to information security.

article

22.1.2025

Password Security: Avoid these 5 common mistakes

Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.

article

16.1.2025

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

article

19.12.2024

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

article

18.12.2024

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

article

3.12.2024

Cybercriminal Adoption of Browser Fingerprinting

🔍 Browser fingerprinting, a technique used to identify browser identities based on client-side factors. While initially used by legitimate organizations to detect misuse, it is now being exploited by cybercriminals.🔒👾 #phishing

Go to article at
11.4.2024

Google now blocks spoofed emails for better phishing protection

Google has reinforced its protection and set guidelines for bulk email senders requiring authentication and compliance with updated standards to better tackle spam and phishing attempts. 📧 🔐 #dataprotection

Go to article at
5.4.2024

World's second-largest eyeglass lens-maker blinded by infosec incident

Hoya, known for their eyeglass and contact lenses, faced a significant infosec attack, halting production and sales. Other Japanese companies, such as Fujitsu and JAXA have also been compromised recently. 💻🛡️#cyberattack

Go to article at
5.4.2024

Digital Arrests: The New Frontier of Cybercrime

🚨 Digital arrest scams are a growing trend, where frauds impersonate law enforcement officials or other authorities and exploit fear by threatening arrest or legal consequences unless victims comply with urgent demands. 🚩 #cyberattack

Go to article at
4.4.2024

AI - The Good, Bad, and Scary

🤖 This dives into the world of AI, interestingly descriping how "AI can be a battlefield of good and evil", with great powers to be used with good intentions, but also for bad. Read about AI benefits, and growing concerns. #cybersecurity

Go to article at
4.4.2024

The Incognito Mode Myth Has Fully Unraveled

Google has settled a class-action lawsuit by agreeing to delete "billions of data records" collected from users using Chrome's Incognito mode, shedding light on its data collection practices. #dataprotection

Go to article at
4.4.2024

8 Strategies for Enhancing Code Signing Security

🔐🚨 Incidents highlight the critical importance of robust code-signing practices for ensuring a secure software supply chain. Code signing adds a digital signature to software, assuring users of its authenticity and integrity. #cyberattack

Go to article at
28.3.2024

Essential elements of a strong data protection strategy

This interview sums up essentials of data protection strategy, particularly in the face of escalating ransomware threats. Understand the 3-2-1 strategy, and reflect on how your organisation protects data from attacks. 🔐 #dataprotection Tässä haastattelussa tiivistetään tietosuojan kannalta oleellisia seikkoja, erityisesti kiristysohjelmien uhkien lisääntyessä. Tutustu 3-2-1-taktiikkaan ja pohdi, miten organisaatiosi suojaa tietoja hyökkäyksiltä. 🔐 #tietosuoja

Go to article at
28.3.2024

Time to examine the anatomy of the British Library ransomware nightmare

📚The British Library's ransomware attack last October exposed systemic failures in enterprise IT. Months later, significant systems remain unrecovered, draining cash reserves meant to last years. 🛡️ Report released #ransomware

Go to article at
28.3.2024