Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is GDPR? Introduction to requirements

What is GDPR? Learn what the General Data Protection Regulation is, who it applies to, key requirements, and how to stay compliant with the EU data privacy law.

article

7.5.2025

Cyber security regulations and frameworks in Belgium 🇧🇪

Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.

article

30.4.2025

What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements

Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.

article

29.4.2025

What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework

Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.

article

29.4.2025

10 things I wish I knew: Starting your ISO 27001 project on the right track

This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.

article

23.4.2025

Understanding NIS2: supervision and penalties of non-compliance

Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).

article

15.4.2025

Comparing EU cybersecurity frameworks: NIS2, GDPR, DORA and more

A comparison of key cybersecurity frameworks in the EU, including NIS2, GDPR, DORA, CRA, and ISO 27001. Learn who they apply to and what they require.

article

10.4.2025

ISO 27001 compliance vs. certification: differences, benefits & which path to choose

Understanding when to pursue ISO 27001 compliance rather than going for certification—or vice versa—hinges on your organizational priorities, resources, and long-term security strategies. Check the differences and learn which path to choose.

article

1.4.2025

What's the Best Way to Communicate After a Data Breach?

Legal counsel is a crucial resource during security incidents. Consulting with legal experts before drafting any communication helps organizations understand what can be communicated and any legal considerations.🛡️ #cybersecurity

Go to article at
22.12.2023

Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster

Companies with large networks are at risk because with remote ransomware, it takes just one underprotected device to compromise the entire network.💻 #dataprotection

Go to article at
22.12.2023

Whatsapp, Slack, Teams, and Other Messaging Platforms Face Constant Security Risks

Organizations must fortify their defenses to protect critical data and operations; much of this can be done by gathering greater visibility over business communication channels. 🛰️ #cybersecurity

Go to article at
15.12.2023

Reimagining Network Pentesting With Automation

Automated testing helps identify vulnerabilities faster and more consistently, overcoming limitations of manual testing. It is emphasized that the efficacy of automated testing depends on choosing the right solution. 🔒 #cybersecurity

Go to article at
15.12.2023

Silent but deadly: The rise of zero-click attacks

Basic cybersecurity tips apply to attacks that require nearly no interaction, like updating your devices and apps, and deleting unused apps and accounts. 🌐🤖 #cybersecurity

Go to article at
15.12.2023

Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk

Offboard effectively, check right-size permissions, eliminate dormant accounts, prevent sharing, and leverage automation with SSPM for comprehensive protection. 👨‍💻🔒 #cybersecurity

Go to article at
8.12.2023

Advanced ransomware campaigns expose need for AI-powered cyber defense

Preventing ransomware threats requires AI and deep learning. Prioritize prevention technologies to enhance cybersecurity resilience, reduce false positives, and integrate AI into business processes. 🛡️ #ransomware

Go to article at
8.12.2023

2024 brings changes in data security strategies

As data monitoring intensifies, companies will empower employees to become "Human Firewalls." Training the workforce on data security issues will enhance the identification and real-time response to potential threats. 🧠 #dataprotection

Go to article at
8.12.2023

Beware of Expired or Compromised Code Signing Certificates

Securely managing code signing certificates is crucial. Neglecting it leads to expired certificates hindering development, eroding user trust, and posing serious security and compliance risks. 💻 #cybersecurity

Go to article at
8.12.2023