Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Recognising growth: move to new offices with Cyberday!

Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.

article

28.11.2024

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Cyber Resilience Lacking, Organizations Overconfident

✍️ A survey highlights significant gaps in cyber resilience, despite high confidence in organizational strategies. While 98% aim to recover within 24 h after a #cyberattack, only 2% can actually achieve this. 🛡️

Go to article at
13.12.2024

Critical Thinking AI in Cybersecurity: A Stretch or a Possibility?

🧠 AI is still focused on automating tasks in #cybersecurity, leaving decision-making to humans. However, with hackers using AI to create more sophisticated attacks, the industry must elevate AI, aiming for critical thinking capabilities.🤖

Go to article at
13.12.2024

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Google has released a security update to fix a high-severity vulnerability in its Chrome browser. The bug allows remote attackers to exploit heap corruption via a specially crafted HTML page.🪲 🖥️ #vulnerability

Go to article at
13.12.2024

FBI Shuts Down Dispossessor Ransomware Group's Servers Across U.S., U.K., and Germany

This takedown reflects the global law enforcement effort to combat ransomware, though attackers continue to innovate, particularly by exploiting trusted relationships with contractors and service providers. 🚨 #ransomware

Go to article at
13.12.2024

Why scammers want your phone number

Phone numbers are central to various scams, including #phishing, smishing, SIM swaps, and call forwarding, which can lead to significant financial and data breaches. 📞⛔️

Go to article at
13.12.2024

Cybersecurity's Real Challenge Is Communication, Not Just Technology

Quick and seamless information sharing is essential for incident response, yet communication remains a significant challenge for security teams. 📣 #vulnerability

Go to article at
13.12.2024

Gold Mining Company Struck by Ransomware Attack

🚨 This #cyberattack follows a similar cyber incident in June involving another Australian mining firm, where sensitive employee data was compromised. In response, Australia has been strengthening its cybersecurity laws and regulations. 👑

Go to article at
13.12.2024

How CIOs, CTOs, and CISOs view cyber risks differently

Do you want to understand the executives better? This article underscores the importance of understanding and aligning the different priorities of CIOs, CTOs, and CISOs to develop effective #cybersecurity strategies. 💼🛡️

Go to article at
13.12.2024

Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited

August 3rd French Grand Palais experienced a suspected #ransomware attack targeting its financial data system, yet no significant disruption occurred. Cyberattacks have been expected during olympics, yet nothing bigger seems to have happened. 🚨

Go to article at
13.12.2024