This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements
Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.
Understanding NIS2: supervision and penalties of non-compliance
Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).
Understanding DORA compliance: Key steps to prepare your organization
Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.
NIS2 & national implementation: which local NIS2 laws are available in Cyberday?
EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.
Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.
Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices
Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.
Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.
Corporate Security Alert: Identifying Dangerous Apps on Employee Phones
This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.
IT and OT Cyber Security: Different Environments, Different Priorities
This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.
Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.
ISMS Essentials: Mastering a Data System Inventory for Your Organization
This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.
Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment
Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.
Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.
Guide to Incident Detection and Reporting: Prepared for the Worst
In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.
This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is a vCISO? Understanding the role of virtual CISO
What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.
What is a modular cyber security framework and why they are essential for consultants
Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.
Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up
This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.
Kicking Off a Summer of Innovation at Cyberday
This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.
What is CRA? Introduction to Cyber Resilience Act requirements
What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.
This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.
HR security in NIS2: Best practices for compliance
Learn how HR drives ISO 27001 and NIS2 compliance through security training, roles, and policies essential for building a strong information security culture.
Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls
What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.
Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today
The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.
Information Security Risk Management: A Step-by-Step Process
Manage information security risks with a clear step-by-step process, from asset identification to monitoring, essential for navigating growing cybersecurity threats.
Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️
In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.
Empowering Employees: The Keystone in Incident Detection and Reporting
Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.
Incident reporting in NIS2: Requirements and related ISO 27001 best practices
Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.
Top information security standards, frameworks and laws explained
Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.
ISO 27001 and NIS2: Understanding their Connection
Learn how ISO 27001 and NIS2 relate, how they differ, and why organizations often address them together for stronger cybersecurity and compliance.
Guide to Incident Detection and Reporting: Prepared for the Worst
In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.
NIS2 Overview: History, key contents and significance for top management
Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.
Best Practices and Common Challenges of ISMS Implementation
No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.