Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

System acquisition and development in NIS2: Suggested best practices

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Continuity management in NIS2: Benchmark measures for business continuity and backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

HR security in NIS2: Best practices for compliance

Learn how HR drives ISO 27001 and NIS2 compliance through security training, roles, and policies essential for building a strong information security culture.

article

5.4.2024

Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Why work-life balance in cybersecurity must start with executive support

Balancing a #cybersecurity role takes more than skill: it takes boundaries, trust, and self-reflection.This CISO shares how prioritizing health, setting limits, and fostering a supportive culture help prevent burnout and build resilience.

Go to article at
27.6.2025

When synthetic identity fraud looks just like a good customer

Synthetic identity fraud blends real and fake data to form convincing fake identities—often with stolen children's info. Hard to detect, it causes billions in losses, harms credit systems, and affects real people. ☠️ #cybercrime

Go to article at
27.6.2025

How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance

New HIPAA rules in 2025 bring stricter #cybersecurity, with MFA, encryption, and risk analysis now required. Focus areas include telehealth, AI, vendor oversight, and stronger patient data access and privacy protections. 🏥

Go to article at
27.6.2025

Generative AI Exacerbates Software Supply Chain Risks

GenAI is fueling a new #cybersecurity risk: attackers exploit AI "hallucinations" by uploading fake, malware-laced code that developers trust too easily. Clear AI transparency and software supply chain standards are urgently needed. 🧑‍💻

Go to article at
27.6.2025

Supply chain attacks surge with orgs 'flying blind' about dependencies

88% of CISOs worry about supply chain risk, yet most don’t monitor beyond direct vendors. With 3rd-party attacks surging, true #cybersecurity resilience means real-time visibility and deeper vendor collaboration. 🌍

Go to article at
27.6.2025

NIST Publishes New Zero Trust Implementation Guidance

NIST has released new guidance to help orgs implement zero trust in real-world settings. It offers 19 example builds using commercial tools to tackle common challenges. A key step forward for practical #cybersecurity 🛡️

Go to article at
13.6.2025

What CISOs need to know about agentic AI

🤖 Agentic AI is changing #cybersecurity by detecting threats and automating response. But with bad data or poor oversight, it can backfire. Smart use and strong governance are key as adoption grows. 🛡️

Go to article at
13.6.2025

Hacking the Hackers: When Bad Guys Let Their Guard Down

A memory bug in servers let researchers secretly watch the malware group's actions for 3 years. They found stolen data, private keys, and hacker info—showing even cybercriminals can slip up with their own security. #cybercrime

Go to article at
13.6.2025

Massive Heroku outage impacts web platforms worldwide

Heroku’s #outage on June 10 impacted also Cyberday’s app availability. No data was compromised, but it served as a valuable insight to review our incident management processes. 🚨

Go to article at
13.6.2025