Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

What is a vCISO? Understanding the role of virtual CISO

What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.

article

12.6.2025

What is a modular cyber security framework and why they are essential for consultants

Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.

article

12.6.2025

Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up

This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.

article

11.6.2025

Kicking Off a Summer of Innovation at Cyberday

This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.

article

10.6.2025

What is CRA? Introduction to Cyber Resilience Act requirements

What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.

article

2.6.2025

NIS2 delays, healthcare breaches & improved Trust Center: Cyberday product and news summary 5/2025 🛡️

This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.

article

30.5.2025

End of hourly billing: why value-based pricing works for compliance consultants

Hourly billing is fading fast in compliance consulting. Learn why value-based pricing better aligns incentives, boosts earnings, and how compliance consultants can transition effectively.

article

26.5.2025

What is an ISMS? A guide to information security management systems

Learn what ISMS is, why it matters, and how to implement an ISMS step-by-step. See how ISO 27001 and NIS2 fit into your information security management system.

article

14.5.2025

LifeLabs Pays Hackers Who Accessed 15M Customers’ Lab Test Results

The data breach disclosure was met with ire from customers whose lab test results, health card numbers and more were accessed.

Go to article at
15.5.2020
Illegal Personal Data Processing

Are ransom payers fueling ransomware?

A new CyberEdge Group report uncovered two trends that are stimulating record-setting ransomware attacks: More ransom payers are successfully recovering their data. In 2018, only 49 percent of ransom payers successfully recovered their data. That number rose to 61 percent in 2019. Today, 67 percent of ransom payers have recovered their data. More payments are incentivizing the ransomware industry. In 2018, only 39 percent of ransomware victims actually paid the ransom. In 2019, that number … More → The post Are ransom payers fueling ransomware? appeared first on Help Net Security.

Go to article at
15.5.2020
Ransomware

Some Hackers Take the Ransom and Run: Researchers

Paying off hackers after a ransomware infection could end up being a total loss, according to a study released Thursday which finds some attackers just take the money and run. read more

Go to article at
15.5.2020
Ransomware

Cloud-Based vs. On-Prem IAM

Organizations across the globe are wondering whether identity management has evolved into the battle of cloud-based vs. on-prem IAM. The post Cloud-Based vs. On-Prem IAM appeared first on JumpCloud. The post Cloud-Based vs. On-Prem IAM appeared first on Security Boulevard.

Go to article at
15.5.2020
Outdated Access Rights

Cybersecurity experts told how to protect yourself when working from home

Go to article at
15.5.2020
Employee Negligence

Ransomware Locks Medical Records at Great Plains Health

Patient data likely safe On Tuesday, GPHealth announced that it was canceling a large number of non-emergent patient appointments and procedures. Mel McNea, GPHealth chief executive officer, says that there is no reason to suspect that patient data was accessed but the organization will do a full audit, nevertheless. Ransomware encrypts files on affected systems and is not typically associated with data theft. The group behind Maze ransomware carried out such an attack and threatened the victim company that they would leak the stolen data unless they paid 300 bitcoin ($2.3 million at the time) for the decryption key. Well on its way to recovery A statement on Facebook from GPHealth informs that there is no reason to believe that patient information was accessed during the attack on their systems. At this moment, it is unclear what ransomware strain was used in the attack or if the ransom was paid to restore the encrypted data.

Go to article at
15.5.2020
Ransomware

SG: Public healthcare cluster NHG fined $6,000 for not securing personal data

Hariz Baharudin reports: Public healthcare cluster National Healthcare Group (NHG) has been fined $6,000 for failing to...

Go to article at
15.5.2020
Illegal Personal Data Processing

Microsoft: 44 Million User Passwords Have Been Breached

Redmond urges users to switch on MFA

Go to article at
15.5.2020
Password Attacks

Security Considerations for a Blended Workforce

A blended workforce consisting of external organizations, traditional workers and non-traditional workers such as freelancers, remote workers, temporary workers and independent contractors (ICs) can provide an organization with the added potential for collaboration, innovation and timely responses to shifting demands. While the integration of a blended workforce can provide exceptional benefits, there are also unique.. The post Security Considerations for a Blended Workforce appeared first on Security Boulevard.

Go to article at
15.5.2020
Employee Negligence