Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

article

16.2.2024

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

ENISA publishes procurement guidelines for cybersecurity in hospitals

The EU Agency for Cybersecurity (ENISA) published a cybersecurity procurement guide for hospitals. The hospital is a vast ecosystem comprised of an entire network of devices, equipment and systems that often require connection to external systems, making monitoring and control a very hard task to do. This is due to the high sensitivity of medical data and the potential vulnerability the sector is faced with, cybersecurity has to be applied every step of the way … More → The post ENISA publishes procurement guidelines for cybersecurity in hospitals appeared first on Help Net Security.

Go to article at
15.5.2020
Supply Chain Attacks

Naive IoT Botnet Wastes Its Time Mining Cryptocurrency

Go to article at
15.5.2020
Malware

Do you have a data breach response plan?

While corporations today are more knowledgeable about security threats and prepared to respond to data breaches, there are key areas in which progress declined in 2019, according to a study conducted by the Ponemon Institute. Prepare beyond your data breach response plan Sixty-eight percent of respondents say their organization has put more resources toward security technologies to detect and respond quickly to a data breach. 57% of those surveyed also reported that they believe their … More → The post Do you have a data breach response plan? appeared first on Help Net Security.

Go to article at
15.5.2020
Violations of Data Subject Rights

Slack bugs allowed take over victims’ accounts

Slack addressed a critical flaw within 24 hours from its disclosure, the issue allowed attackers to carry out automate account takeover. The researcher Evan Custodio discovered a critical vulnerability in Slack that could have allowed attackers to launch automate account takeover. Slack addressed the vulnerability within 24 hours it was reported by the researcher, the […] The post Slack bugs allowed take over victims’ accounts appeared first on Security Affairs.

Go to article at
15.5.2020
Unpatched Vulnerabilities

Cyber Fitness Takes More Than a Gym Membership & a Crash Diet

Make cybersecurity your top priority, moving away from addressing individual problems with Band-Aids and toward attaining a long-term cyber-fitness plan.

Go to article at
15.5.2020
Employee Negligence

SECURITI.ai named Most Innovative Startup at RSA Conference 2020

SECURITI.ai was selected winner of the fifteenth-annual RSA Conference Innovation Sandbox Contest and named “Most Innovative Startup” by a panel of leading venture capitalists, entrepreneurs and industry veterans. SECURITI.ai is a leader in AI-powered PrivacyOps. Its PRIVACI.ai solution automates privacy compliance with patent-pending People Data Graphs and robotic automation. It enables enterprises to give rights to people on their data, comply with global privacy regulations and build trust with customers. “We are honored to join … More → The post SECURITI.ai named Most Innovative Startup at RSA Conference 2020 appeared first on Help Net Security.

Go to article at
15.5.2020
CyberNow

Seven key cybersecurity trends for 2020 by world-leading professionals

The developments in the area of cybersecurity are alarming. As the number of smart devices in private households increase, so do the opportunities for cybercriminals to attack, according to TÜV Rheinland. Key cybersecurity trends for 2020 Uncontrolled access to personal data undermines confidence in the digital society. The logistics industry and private vehicles are increasingly being targeted by hackers. Experts view these key cybersecurity trends as critical to understand in 2020. “From our point of … More → The post Seven key cybersecurity trends for 2020 by world-leading professionals appeared first on Help Net Security.

Go to article at
15.5.2020
CyberNow

School management software provider discloses severe security breach

Active Network discloses security incident that impacted school online stores built on the Blue Bear platform.

Go to article at
15.5.2020
Supply Chain Attacks

Google addresses high severity bugs in Chrome

Google released security updates to address multiple high-severity vulnerabilities in the popular Chrome browser. Google released security updates to address multiple high-severity vulnerabilities in Chrome, the tech giant also announced a pause for upcoming releases of the popular browser. The version 80.0.3987.149 is available for download for Windows, Mac, and Linux. Google announced that it […] The post Google addresses high severity bugs in Chrome appeared first on Security Affairs.

Go to article at
15.5.2020
Unpatched Vulnerabilities