Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Strong incident management process minimizes disruptions. Learn how to build a process that keeps your org running during critical events.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

Explore the top 10 responsibilities of a CISO and get best practices for success, covering risk management, collaboration, compliance, and continuous learning.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

AI Agents May Have a Memory Problem

AI agents with memory can be hacked by planting fake info, making them act on false commands. A new study shows how easy it is—posing serious risks for finance, healthcare, and more. Memory security is now a must. 🔐 #dataprotection

Go to article at
6.6.2025

Police Shut Down Fake Trading Platform That Scammed Hundreds

💸 A fake trading platform scamming victims out of €3M was shut down in a global police operation. The case shows how cybercrime crosses borders—and why international cooperation is key. 🌍 #cybercrime

Go to article at
6.6.2025

NIS2 delays should not be cause for business inaction

Most EU countries missed the NIS2 transposition deadline, creating legal uncertainty for businesses in scope. But waiting is risky—proactive compliance planning is still the safest route.⭐️🛡️ #cybersecurity

Go to article at
6.6.2025

Meta's still violating GDPR rules with latest plan to train AI on EU user data, says noyb

Meta’s plan to train AI on 20 years of EU user data is facing legal fire, which argues it violates GDPR by skipping explicit consent. The battle over AI, data rights, and ‘legitimate interest’ may soon head to court. 👀 #privacy

Go to article at
6.6.2025

Navigating DORA and NIS2 Compliance for Financial Sector Organisations in the EU

DORA and NIS2 are reshaping cybersecurity in the EU—but many orgs are still unprepared. Compliance isn't just a legal task; it's about building resilience, trust, and readiness for real-world threats. 👻 #cybersecurity

Go to article at
30.5.2025

You'll never guess which mobile browser is the worst for data collection

Which mobile browser collects the most data? 👀 A new Surfshark study ranks the top 10 by data types collected—some grab precise location, financial info, and more. The most popular browsers aren't always the most private. #dataprotection

Go to article at
9.5.2025

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

❤️‍🩹 Healthcare faces rising insider data risks—81% of violations involve regulated health data, often shared via GenAI tools like ChatGPT. DLP policies and approved AI tools help reduce "shadow AI" and improve security. #CyberSecurity

Go to article at
9.5.2025

Top 10 Cloud Security Mitigation Tactics

Cloud threats are evolving fast. 🌩️ Strong IAM, encryption, monitoring, and user training are just a few key tactics to secure your cloud environment and reduce risk. LEt's stay proactive, not reactive. #cybersecurity

Go to article at
9.5.2025

UK shares security tips after major retail cyberattacks

Following recent incidents at top UK retailers, the NCSC urges companies to revisit access controls, helpdesk protocols, and MFA. 🔐 Proactive steps today can prevent major disruptions tomorrow. #vulnerability

Go to article at
9.5.2025