Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

article

25.10.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

SOC 2: Working towards compliance

With the help of SOC 2, organisations can provide proof of effectively implemented controls and the use of best practices to protect the data to their customers and stakeholders, which may help to build trust.

article

31.7.2023

Personnel information security training and guidelines in Cyberday

Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.

article

13.6.2023

Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure

Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.

article

13.6.2023

CrowdStrike Reveals Root Cause of Global System Outages

Crowdstrike has been the talk of the whole world over the last month, and with good reasons. They now released a root cause analysis of the Falcon Sensor software update crash that affected millions of Windows devices globally. 🦅 #outage

Go to article at
13.12.2024

3 Types of Bot Attacks to Guard Against

Bot attacks pose a significant threat to businesses and individuals, with bad bots accounting for 32% of global web traffic in 2023. Effective bot management is essential to distinguish between legitimate and malicious bots. #dataprotection

Go to article at
13.12.2024

Phishing Attacks Can Bypass Microsoft 365 Email Safety Warnings

Researchers exposed a vulnerability in Microsoft 365's anti-phishing measures has been allowing attackers to hide and make harmful emails appear legitimate. This #vulnerability highlights the need for increased vigilance. 🎣⛔️

Go to article at
13.12.2024

The role of AI in cybersecurity operations

🔒 SOC analysts can be sifting through countless alerts, many of which are false positives. Embracing AI in cybersecurity creates a powerful partnership between technology and human expertise. #cybersecurity

Go to article at
13.12.2024

When spear phishing met mass phishing

⛔️ There are many #phishing techniques, but at the end, these can be divided into two different main types: mass phishing with bulk audience or more targeted spear phishing. Be prepared, and learn about these two tactics work. 🎣

Go to article at
13.12.2024

A crafty phishing campaign targets Microsoft OneDrive users

🚨 Trellix has identified a sophisticated #phishing campaign targeting Microsoft OneDrive users. Check how cybercriminals are using social engineering tactics to trick users. Stay safe and protect your systems! 🛡️

Go to article at
13.12.2024

The complexities of cybersecurity update processes

Despite thorough testing, incidents causing major disruptions remind us that no system is infallible. ⏰ Let's stay vigilant and ensure robust, multi-layered defenses.🛡️ #vulnerability

Go to article at
13.12.2024

5 Ways Generative AI is Revolutionizing Cybersecurity Defense

AI has its pros and cons, and it's worth exploring its weaknesses and potential. Comparing to traditional AI, Generative AI can generate new data, simulates potential attacks, and adapts quickly to emerging threats. 🤖🛡️ #cybersecurity

Go to article at
13.12.2024

Cybercriminals Exploit CrowdStrike Outage Chaos

📍 The NCSC noted an increase in phishing attacks following the Crowdstrike outage as cybercriminals are exploiting it to launch phishing campaigns, posing as legitimate sources of help. ⚠️ #phishing

Go to article at
13.12.2024