This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements
Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.
Understanding NIS2: supervision and penalties of non-compliance
Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).
Understanding DORA compliance: Key steps to prepare your organization
Understand DORA compliance and get a clear DORA requirements summary with key compliance areas, practical steps, and essential guidelines to strengthen your organization's digital resilience.
NIS2 & national implementation: which local NIS2 laws are available in Cyberday?
EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.
Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.
Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices
Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.
Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.
Corporate Security Alert: Identifying Dangerous Apps on Employee Phones
This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.
IT and OT Cyber Security: Different Environments, Different Priorities
This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.
Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.
ISMS Essentials: Mastering a Data System Inventory for Your Organization
This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.
Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment
Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.
Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.
Guide to Incident Detection and Reporting: Prepared for the Worst
In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.
This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is a vCISO? Understanding the role of virtual CISO
What is a vCISO, what they do, and why the virtual CISO model is growing fast among companies and cybersecurity consultants.
What is a modular cyber security framework and why they are essential for consultants
Modular cyber security frameworks make compliance management easier, and helps consultants scale faster, win more deals, and build recurring revenue.
Cyberday app outage on Tuesday 10/6/2025: Explanation and follow-up
This message goes through the details of the recent incident that produced downtime in Cyberday during 10.6.2025, and related early mitigation.
Kicking Off a Summer of Innovation at Cyberday
This summer, Cyberday is proud to launch an ambitious and inspiring project centered on deep regulatory research and international collaboration. We’ve welcomed 12 talented information security students, who will work together to simplify compliance.
What is CRA? Introduction to Cyber Resilience Act requirements
What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.
This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.
Personnel information security training and guidelines in Cyberday
Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.
Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure
Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.
Become a Cyberday partner: Features, benefits and best practices
A good and efficient tool such as Cyberday is a great way to work on the organization's cyber secuirty. However, for some organizations that is not enough and the expertise and support of a consultant is needed. Our partner program offers both!
Cyberday Community has been launched!
We just launched a new Community section inside Cyberday. Our goal is to make collaboration with your peers and with us easier and thus help you improve your information security even further!
ISO 27001 standard updated to 2022 version - what changed?
What has changed when comparing 2013 vs. 2022 versions of ISO 27001 and how are these updates visible on Cyberday?
Efficient cyber risk management with new autopilot mode
We're constatly searching for ways to automate and create efficient cyber risk management. Our newest additions is risk autopilot mode. It's concept is described on this post.
Infographic: Why is cyber security getting more and more important?
Here's a visual summary of some of the drivers that continue to make cyber security more and more important for all organizations.
Cyberday Teams app is now available!
Our Teams app passed the latest Microsoft tests and is now available from the Teams app store. This article reviews the benefits and deployment of Cyberday's Teams app.
Content update published to Cyberday
We released an update to Cyberday documentation. The goal was to streamline documentation, highlight the most important things and significantly reduce the amount of separately documented items.
Cyberday launched: Frameworks, Teams-integration and much more
Cyberday works now inside a Microsoft Teams and by choosing a framework you can guide your own work. In this blog you'll find a summary from reforms!