Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

NIS2 & national implementation: which local NIS2 laws are available in Cyberday?

EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.

article

23.1.2025

ISO 27001 certification: What happens in the certification audit?

This blog post gives an overall intro to information security auditing and a detailed go-through of the ISO 27001 certification audit process.

article

22.1.2025

What is ISO 27001? Intro to the global information security gold standard.

Whether you're new to ISO 27001 or looking to strengthen your current practices, this post will walk you through its essentials, why it matters, and how it can improve your approach to information security.

article

22.1.2025

Password Security: Avoid these 5 common mistakes

Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.

article

16.1.2025

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

article

19.12.2024

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

article

18.12.2024

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

article

3.12.2024

Recognising growth: move to new offices with Cyberday!

Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.

article

28.11.2024

Dutch Govt Warns of 3 Ransomware Infecting 1,800 Businesses

A confidential report from the National Cyber Security Centre (NCSC) in the Netherlands informs that at least 1,800 companies are affected by ransomware across the world. [...]

Go to article at
15.5.2020
Ransomware

445 million attacks detected since the beginning of 2020, COVID-19 wreaks havoc

In the first quarter of 2020, the Arkose Labs network recorded the highest attack rate ever seen. 26.5% of all transactions were fraud and abuse attempts, which is a 20% increase over the previous quarter. With COVID-19 restricting face-to-face interactions across the globe, consumer behavior is in flux and digital transactions are on the rise. Organized fraud operations have been quick to mobilize, targeting spikes in digital activity. Changing attack patterns during COVID-19 The report … More → The post 445 million attacks detected since the beginning of 2020, COVID-19 wreaks havoc appeared first on Help Net Security.

Go to article at
15.5.2020
Phishing

Looking at the future of identity access management (IAM)

Here we are: at the beginning of a new year and the start of another decade. In many ways, technology is exceeding what we expected by 2020, and in other ways, well, it is lacking. Back to the Future made us think we would all be using hoverboards, wearing self-drying and fitting jackets, and getting to and from the grocery store in flying cars by Oct. 21, 2015. Hanna-Barbera promised us a cutting-edge, underwater research … More → The post Looking at the future of identity access management (IAM) appeared first on Help Net Security.

Go to article at
15.5.2020
Outdated Access Rights

Users can now Use 2 Step Verification on their Chrome and Safari Browser

Go to article at
15.5.2020
Password Attacks

Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.

Go to article at
15.5.2020
Unpatched Vulnerabilities

Compliance and Privacy in the GDPR Era

In the age of GDPR and CCPA, there seems to be more conjecture about compliance and personal privacy than there is about the weather. It’s understandable, as predicting the conditions outside seems a lot easier than devising and implementing an effective data protection strategy. With headlines about data breaches being far too frequent and substantial.. The post Compliance and Privacy in the GDPR Era appeared first on Security Boulevard.

Go to article at
15.5.2020
Illegal Personal Data Processing

It's time to track people's smartphones to ensure they self-isolate during this global pandemic, says WHO boffin

Overseas travelers and others need to stay home – and we should use their phones to monitor them, we're told Tracking and limiting the movements of overseas travelers, and others suspected to be COVID-19 coronavirus carriers, has proved an essential tool in controlling the pandemic.…

Go to article at
15.5.2020
Illegal Personal Data Processing

Zero Trust Access: Santa Claus Wasn’t the Only One Working Christmas Eve

The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea... The post Zero Trust Access: Santa Claus Wasn’t the Only One Working Christmas Eve appeared first on Security Boulevard.

Go to article at
15.5.2020
Outdated Access Rights

Wake-on-Lan used by Ryuk Ransomware To Encrypt Offline Devices

The Ryuk Ransomware uses the Wake-on-Lan feature to turn on powered off devices on a compromised network to have greater success encrypting them. Wake-on-Lan is a hardware feature that allows a powered down device to be woken up, or powered on, by sending a special network packet to it. This is useful for administrators who may […] The post Wake-on-Lan used by Ryuk Ransomware To Encrypt Offline Devices appeared first on IT Security Guru.

Go to article at
15.5.2020
Ransomware