Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is GDPR? Introduction to requirements

What is GDPR? Learn what the General Data Protection Regulation is, who it applies to, key requirements, and how to stay compliant with the EU data privacy law.

article

7.5.2025

Cyber security regulations and frameworks in Belgium 🇧🇪

Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.

article

30.4.2025

What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements

Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.

article

29.4.2025

What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework

Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.

article

29.4.2025

10 things I wish I knew: Starting your ISO 27001 project on the right track

This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.

article

23.4.2025

Understanding NIS2: supervision and penalties of non-compliance

Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).

article

15.4.2025

Comparing EU cybersecurity frameworks: NIS2, GDPR, DORA and more

A comparison of key cybersecurity frameworks in the EU, including NIS2, GDPR, DORA, CRA, and ISO 27001. Learn who they apply to and what they require.

article

10.4.2025

ISO 27001 compliance vs. certification: differences, benefits & which path to choose

Understanding when to pursue ISO 27001 compliance rather than going for certification—or vice versa—hinges on your organizational priorities, resources, and long-term security strategies. Check the differences and learn which path to choose.

article

1.4.2025

Here’s How Phishing Messages Break Through Email Filters

Phishing continues to be a major cyber threat. As attackers create more advanced techniques to evade defenses, these attacks are becoming increasingly difficult to identify. 🎣🚨 #phishing

Go to article at
30.8.2024

Dodging the Cyber Bullet: Early Signs of a Ransomware Attack

To defend against ransomware, companies might focus on regular patching, robust access controls, employee awareness, and comprehensive backup strategies. Understanding these risks and being proactive are key to safeguarding against #ransomware 👇

Go to article at
23.8.2024

People Overconfident in Password Habits, Overwhelmed by Too Many Passwords

Research uncovers alarming trends in password management, highlighting a gap between perceived #cybersecurity knowledge and actual practices. For example, 40% admitted to password reuse and a high proportion share their passwords. 🔐

Go to article at
1.8.2024

Surging data breach disruption drives costs to record highs

IBM's 2024 Cost of a Data Breach Report highlights a significant surge in data breach costs, with the global average reaching a record $4.88 million—a 10% increase from last year. 📊🛡️ #cybersecurity

Go to article at
1.8.2024

4 “Low-Priority” Online Threats That Can Inflict Serious Brand Damage

Brand attacks are surging in 2024, causing severe financial and reputational damage. It's crucial for organizations of all sizes to understand the gravity of these threats and develop contingency plans. 🚨 #cyberattack

Go to article at
24.7.2024

Regulatory Compliance and Ransomware Preparedness

📝 Regulatory compliance is a foundational step in protecting against #ransomware . To combat this threat, global efforts focus on cybersecurity regulations and frameworks such as NIS2 & DORA that standardize and mandate protective measures. 🛡️

Go to article at
5.7.2024

Australian man charged for Evil Twin Wi-Fi attacks on domestic flights

In this type of attack, a rogue wireless access point mimics a legitimate one, tricking users into connecting to it. This allows the attacker to intercept and manipulate the transmitted data, stealing user credentials and data.🔊 #cybercrime

Go to article at
4.7.2024

Evolve Bank Data Breach Puts Affirm Cardholders Info at Risk

In recent data breach to Affirm Holdings' Evolve Bank & Trust, customer data was accessed. However by the company, customer funds nor Affirm's systems were compromised. ❌ #cybercrime

Go to article at
4.7.2024

Mitigating Skeleton Key, a new type of generative AI jailbreak technique

Microsoft has identified a new jailbreak technique called Skeleton Key, which uses a multi-turn strategy to bypass model safeguards. This technique works by gradually convincing the AI to update its behavior guidelines.🤖🔑 #cybercrime

Go to article at
28.6.2024