Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

NIS2: Working towards compliance with Cyberday (3/3)

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

NIS2: Who's in the scope and what security measures are required? (part 2/3)

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

NIS2: Get familiar with the EU's new cyber security directive (part 1/3)

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

Apple May Start Delivering Security Patches Separately From Other OS Updates

Many users prefer to keep their device's design / functionality in a state they're comfortable with, but still don't want to fall behind on security updates. On Android this is already possible, and soon iOS may follow. #cybersecurity

Go to article at
23.3.2021

Microsoft Ships One-Click Mitigation Tool for Exchange Attacks

As some news report 80,000 exchange servers are still affected by actively exploited vulnerabilities, Microsoft addresses the attacks with a one-click mitigation tool published on 15.3. to help contain the damage. #cybersecurity

Go to article at
19.3.2021

Phishing Attacks that Defeat 2FA Every Time

2FA is certainly a best practice for corporate security, but cyber criminals are also quite good at defeating it. See it as one basic-level task on your cyber security management. 🔓 4 examples of defeating 2FA #cybersecurity

Go to article at
19.3.2021

Ransomware is targeting vulnerable Microsoft Exchange servers

Exchange attack development in 10 days: from targeted attacks by nation-state actors ➡️ to countless attacks by groups against anyone with a vulnerable server unused web shells ➡️ ransomware #cybersecurity

Go to article at
19.3.2021

COVID-19 testing service in US exposes patients’ photos, passports

Driver’s licenses, medical insurance cards, passports, and other IDs of 50 000 people were accessible without any authentication procedure on unsecured Amazon S3 buckets. #cybersecurity

Go to article at
19.3.2021

If you are not finding vulnerabilities, then you are not looking hard enough

Transparent security communications are appreciated. 73% of respondents said they prefer to buy technology and services from providers who actively communicate the vulnerabilities they find and mitigate. #cybersecurity

Go to article at
16.3.2021

OVH data center burns down knocking major sites offline

Customer's disaster recovery plans get truly tested, as data centers of OVH located in Strasbourg, France have been destroyed by fire. #cybersecurity

Go to article at
12.3.2021

Microsoft Edge Legacy will now prompt you to install Chromium Edge

Microsoft Edge Legacy has officially reached the end of life today, and starting tomorrow, the web browser will begin displaying notifications telling users to switch to the new Chromium-based Microsoft Edge. #cybersecurity

Go to article at
10.3.2021

Why the Microsoft Exchange Server attack isn’t going away soon

Timeline info about the Exchange Server attack. Responding to these kinds of vulnerabilities can be time-consuming and create lots of downtime, especially if Exchange patching has already been lagging behind. #cybersecurity

Go to article at
10.3.2021