Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Most important documents in ISO 27001 certification audit

The ISO 27001 standard does specifically define some key documents, which need to be gathered together and be easily shareable e.g. for the auditor. In this blog, we'll present these most important documents for an ISO 27001 certification audit.

article

30.1.2025

NIS2 & national implementation: which local NIS2 laws are available in Cyberday?

EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.

article

23.1.2025

ISO 27001 certification: What happens in the certification audit?

This blog post gives an overall intro to information security auditing and a detailed go-through of the ISO 27001 certification audit process.

article

22.1.2025

What is ISO 27001? Intro to the global information security gold standard.

Whether you're new to ISO 27001 or looking to strengthen your current practices, this post will walk you through its essentials, why it matters, and how it can improve your approach to information security.

article

22.1.2025

Password Security: Avoid these 5 common mistakes

Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.

article

16.1.2025

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

article

19.12.2024

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

article

18.12.2024

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

article

3.12.2024

What Are Computer Worms?

💻 In our increasingly interconnected world, computer worms remain one of the most silent yet dangerous cyber threats. But what are worms and how they work? Staying informed and proactive is key to protecting your systems.🪱 #malware

Go to article at
5.12.2024

Another 'major cyber incident' at a UK hospital, outpatients asked to stay away

Cyberattacks on healthcare are increasing, highlighting the urgent need for robust cybersecurity measures. Protecting patient data and ensuring operational continuity must be a top priority for healthcare providers. 🏥 #cyberattack

Go to article at
29.11.2024

Starbucks, grocery stores impacted by Blue Yonder ransomware attack

A ransomware attack has disrupted employee scheduling and payroll systems at Starbucks. The ripple effects extend beyond Starbucks, affecting major retailers like the UK's Morrisons and Sainsbury's. ☕️ #ransomware

Go to article at
29.11.2024

Tips and Tools for Social Media Safety

📲 Social media connects us, but it can also expose us to privacy and security risks. Check tips how to stay secure and share awareness to your colleagues, friends and family. 🛡️ #cybersecurity

Go to article at
29.11.2024

Automating Data Encryption and Security Audits for Continuous Protection

The global cost of cyberattacks is projected to reach $9.5 trillion in 2024.💰 Automation empowers businesses to proactively defend against cyber threats, ensuring robust, consistent, and adaptive data security. #cybercrime

Go to article at
29.11.2024

Expert Insight: The digital pandemic: How cyber threats are threatening life as we know it

🛡️ Cyber threats are escalating, with 50% of businesses experiencing breaches and experts observing an increase in attacks. In today’s interconnected world, a single vulnerability can spread rapidly, affecting millions. 🦠 #vulnerability

Go to article at
15.11.2024

Quishing: A growing threat hiding in plain sight

QR codes offer quick access and convenience, but this ease has also made them a target for cybercriminals through “quishing”. Stay cautious – convenience shouldn’t compromise security. 👀 #phishing

Go to article at
1.11.2024

3 proven use cases for AI in preventative cybersecurity

AI can be a game-changer in cybersecurity, driving cost savings and efficiency, but the human element remains essential for interpreting and acting on AI insights. 🤖 #cybersecurity

Go to article at
25.10.2024

Intel Broker Claims Cisco Breach, Selling Stolen Data from Major Firms

🛡️ Intel Broker, a hacker known for high-profile breaches, has claimed responsibility for a massive data breach at Cisco. The incident highlights the ongoing cybersecurity risks even large enterprises face. 🚨 #cybercrime

Go to article at
23.10.2024