This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.
Recognising growth: move to new offices with Cyberday!
Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.
Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.
We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium to Cyberday, our new name better reflects our entity, and the direction we are heading.
This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is a vCISO? Understanding the role of virtual CISO
What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.
What is a modular cyber security framework and why they are essential for consultants
Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.
Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up
This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.
Kicking Off a Summer of Innovation at Cyberday
This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.
What is CRA? Introduction to Cyber Resilience Act requirements
What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.
This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.
HR security in NIS2: Best practices for compliance
Learn how HR drives ISO 27001 and NIS2 compliance through security training, roles, and policies essential for building a strong information security culture.
Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls
What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.
Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today
The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.
Information Security Risk Management: A Step-by-Step Process
Manage information security risks with a clear step-by-step process, from asset identification to monitoring, essential for navigating growing cybersecurity threats.
Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️
In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.
Empowering Employees: The Keystone in Incident Detection and Reporting
Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.
Incident reporting in NIS2: Requirements and related ISO 27001 best practices
Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.
Top information security standards, frameworks and laws explained
Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.
ISO 27001 and NIS2: Understanding their Connection
Learn how ISO 27001 and NIS2 relate, how they differ, and why organizations often address them together for stronger cybersecurity and compliance.
Guide to Incident Detection and Reporting: Prepared for the Worst
In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.
NIS2 Overview: History, key contents and significance for top management
Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.
Best Practices and Common Challenges of ISMS Implementation
No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.