Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

NIS2 Incident Reporting Requirements and related ISO 27001 Best Practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Remote Work's Hidden Dangers

💻 Remote work introduces new security threats such as phishing scams, ransomware, and unsecured home networks. What dangers need to be taken into account? 🏡 #dataprotection

Go to article at
6.6.2024

UK School Forced to Close Following Cyber-Attack

🚨 The school in Essex was forced to close on June 3rd after a significant #cyberattack compromised its IT systems with complex encryption. the attack rendered all IT systems inaccessible, despite the industry-standard security measure. 📚

Go to article at
6.6.2024

The murky world of password leaks – and how to check if you’ve been hit

🌍 This how to -article takes the reader into the world of passwords. It shows you how to check if your credentials have been leaked, and advises you how to avoid and minimise the impact of the leak. 🔒 #cybersecurity

Go to article at
6.6.2024

Human error still perceived as the Achilles’ heel of cybersecurity

Human error remains a major concern, with 74% of CISOs citing it as the biggest vulnerability. Insider threats and data loss driven by employee negligence are on the rise, but with the help of AI the risks could be mitigated. #vulnerability

Go to article at
31.5.2024

Hackers Claim Ticketmaster Data Breach: 560M Users’ Info for Sale at $500K

🕵️‍♂️ Hacker group claims to have breached Ticketmaster, compromising the personal data of 560 million users. The compromised information includes e.g. full names, addresses, order information, and partial payment card data. 🚨 #cybercrime

Go to article at
31.5.2024

9 Tips to Avoid Burnout in Cybersecurity

Cybersecurity is a high-stress field with near-constant work demands, leading to significant health issues. Survey revealed that 62% of IT and security leaders have experienced burnout, but how could we avoid this? #cybersecurity

Go to article at
31.5.2024

6 Facts About How Interpol Fights Cybercrime

Did you know, that cybercrime is one of Interpol's four global programs? As Interpol enters its second century, it continues to be a highly relevant policing organization in our technologically advanced age. #cybercrime

Go to article at
31.5.2024

Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

🐈‍⬛ The CatDDoS botnet is exploiting over 80 known vulnerabilities in software from major vendors. Active since August 2023, this Mirai variant targets devices globally, impacting sectors from cloud services to education. 🚨 #vulnerability

Go to article at
31.5.2024

Despite increased budgets, organizations struggle with compliance

Despite 93% of organizations rethinking strategies and 92% increasing budgets, many still feel unprepared for new regulations. Talent shortage and fragmented infrastructure are major obstacles to compliance and resilience.🛡️ #cybersecurity

Go to article at
24.5.2024