Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

NIS2: Working towards compliance with Cyberday (3/3)

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

NIS2: Who's in the scope and what security measures are required? (part 2/3)

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

NIS2: Get familiar with the EU's new cyber security directive (part 1/3)

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

Beware: Walmart phishing attack says your package was not delivered

Phishing victims are urged to send their mailing address to the attacker impersonating Walmart. Goal is likely to use address info to conduct a more malicious activities, sending you further, more customized scam emails. #cybersecurity

Go to article at
3.6.2021

Euroopan tietosuojaneuvostolta lausunnot ensimmäisistä ylikansallisista käytännesäännöistä ja suosituksia luottokorttitietojen tallentamisen oikeusperusteesta

🚀 EDPB approved first codes of conduct. E.g. CLOUD CoC gives guidance and specific requirements cloud providers can comply to demonstrate that they act in accordance with the requirements of GDPR. #cybersecurity

Go to article at
3.6.2021

Google Play Store to Add Privacy Labels to Android Apps by 2022

Following Apple’s similar initiative, Google announced privacy labels arriving to Play Store. The purpose is to give user a brief summary to apps #cybersecurity, related assurance, and personal data processing practices.

Go to article at
28.5.2021

Cybersecurity leaders lacking basic cyber hygiene

74% of cybersec leaders targeted in phishing attack in last 90 days. Still basic security hygiene is partly lacking: ⚠️ 45% connect to public Wi-Fi without a VPN ⚠️ 24% use the same passwords for work and personal use #cybersecurity

Go to article at
28.5.2021

DHS to issue first cybersecurity regulations for pipelines after Colonial hack

The recent Colonial Pipeline attack has mobilized authorities in the United States. For the first time, cyber security in the pipeline industry is being regulated in attempt to avoid similar situations in the future. #cybersecurity

Go to article at
28.5.2021

Päivitä heti: VMware varoittaa kriittisestä haavoittuvuudesta

VMware prompts vCenter users to patch vCenter Server versions 6.5, 6.7, and 7.0 immediately. Upon gaining access to port 443, an attacker may choose to run any code of his choice on the host. #cybersecurity

Go to article at
28.5.2021

Should Paying Hacker Ransoms Be Illegal?

#Ransomware gangs make money. Colonial Pipeline just paid 4,5 M$ ransom - small part of one group's earnings. No-one wants payments for crooks, but ban has its difficulties too, especially if organisation is poorly prepared. #cybersecurity

Go to article at
21.5.2021

Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime, APT Groups

Data from Sophos shows that Cobalt Strike, a threat emulation software, is one of the top tools used in cyber attacks. Cyber criminals use it to e.g. drop malware and employ PowerShell commands to camouflage their activity. #cybersecurity

Go to article at
21.5.2021

The basics of security code review

Article gives ideas for improving code security: ✅ determine common vulnerabilities for the type of app you’re working with ✅ dedicate enough time for reviewing code / fixing bugs ✅ use automated SCA & SAST tools #cybersecurity

Go to article at
19.5.2021