Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Dutch Govt Warns of 3 Ransomware Infecting 1,800 Businesses

A confidential report from the National Cyber Security Centre (NCSC) in the Netherlands informs that at least 1,800 companies are affected by ransomware across the world. [...]

Go to article at
15.5.2020
Ransomware

445 million attacks detected since the beginning of 2020, COVID-19 wreaks havoc

In the first quarter of 2020, the Arkose Labs network recorded the highest attack rate ever seen. 26.5% of all transactions were fraud and abuse attempts, which is a 20% increase over the previous quarter. With COVID-19 restricting face-to-face interactions across the globe, consumer behavior is in flux and digital transactions are on the rise. Organized fraud operations have been quick to mobilize, targeting spikes in digital activity. Changing attack patterns during COVID-19 The report … More → The post 445 million attacks detected since the beginning of 2020, COVID-19 wreaks havoc appeared first on Help Net Security.

Go to article at
15.5.2020
Phishing

Looking at the future of identity access management (IAM)

Here we are: at the beginning of a new year and the start of another decade. In many ways, technology is exceeding what we expected by 2020, and in other ways, well, it is lacking. Back to the Future made us think we would all be using hoverboards, wearing self-drying and fitting jackets, and getting to and from the grocery store in flying cars by Oct. 21, 2015. Hanna-Barbera promised us a cutting-edge, underwater research … More → The post Looking at the future of identity access management (IAM) appeared first on Help Net Security.

Go to article at
15.5.2020
Outdated Access Rights

Users can now Use 2 Step Verification on their Chrome and Safari Browser

Go to article at
15.5.2020
Password Attacks

Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.

Go to article at
15.5.2020
Unpatched Vulnerabilities

Compliance and Privacy in the GDPR Era

In the age of GDPR and CCPA, there seems to be more conjecture about compliance and personal privacy than there is about the weather. It’s understandable, as predicting the conditions outside seems a lot easier than devising and implementing an effective data protection strategy. With headlines about data breaches being far too frequent and substantial.. The post Compliance and Privacy in the GDPR Era appeared first on Security Boulevard.

Go to article at
15.5.2020
Illegal Personal Data Processing

It's time to track people's smartphones to ensure they self-isolate during this global pandemic, says WHO boffin

Overseas travelers and others need to stay home – and we should use their phones to monitor them, we're told Tracking and limiting the movements of overseas travelers, and others suspected to be COVID-19 coronavirus carriers, has proved an essential tool in controlling the pandemic.…

Go to article at
15.5.2020
Illegal Personal Data Processing

Zero Trust Access: Santa Claus Wasn’t the Only One Working Christmas Eve

The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea... The post Zero Trust Access: Santa Claus Wasn’t the Only One Working Christmas Eve appeared first on Security Boulevard.

Go to article at
15.5.2020
Outdated Access Rights

Wake-on-Lan used by Ryuk Ransomware To Encrypt Offline Devices

The Ryuk Ransomware uses the Wake-on-Lan feature to turn on powered off devices on a compromised network to have greater success encrypting them. Wake-on-Lan is a hardware feature that allows a powered down device to be woken up, or powered on, by sending a special network packet to it. This is useful for administrators who may […] The post Wake-on-Lan used by Ryuk Ransomware To Encrypt Offline Devices appeared first on IT Security Guru.

Go to article at
15.5.2020
Ransomware