Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

System acquisition and development in NIS2: Suggested best practices

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Continuity management in NIS2: Benchmark measures for business continuity and backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

HR security in NIS2: Best practices for compliance

Discover how the crucial role of HR in information security not only shapes the corporate security culture, but also steers the organization towards ISO 27001 and NIS2 compliance, ensuring secure handling of information assets and much more.

article

5.4.2024

Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Cybersecurity is stepping into a new era of complexity

Global Cybersecurity Outlook 2025 highlights the growing intricacy of #cybersecurity challenges. Threat landscape is reshaped by emerging technologies, widening cyber skill gaps and vulnerabilities. Read insights from the report. 💬 📈

Go to article at
17.1.2025

Cybersecurity Risks in Crypto: Phishing, Ransomware and Other Emerging Threats

The rise of cryptocurrencies has brought innovation and decentralization but also made the industry a prime target for cyber threats. Read about the most common risks and strategies and proactively safeguard your assets.💰💻 #vulnerability

Go to article at
10.1.2025

Only 26% of Europe’s top companies earn a high rating for cybersecurity

DORA is set to be operational by January 17th. As organizations gear up to meet these critical requirements, they have a vital opportunity to refine and elevate their #cybersecurity measures. 🛡️ Work on DORA in Cyberday!

Go to article at
10.1.2025

Cybercriminals Don't Care About National Cyber Policy

As the US prepares for a leadership transition, the future of #cybersecurity policies and regulations remains unclear. Will we see new laws, deregulation, or changes to agencies? 👀

Go to article at
10.1.2025

Seven Trends to Watch for in 2025

As 2025 is here, it's time to look into predicted trends. ⭐️ This article highlights key themes like enhanced MFA adoption and the importance of shared responsibility - let's make 2025 more secure! 🛡️ #cybersecurity

Go to article at
10.1.2025

A Day in the Life of a Prolific Voice Phishing Crew

Recent insights from KrebsOnSecurity detail how a prolific voice #phishing group operates 🎣 Tactics include e.g. triggering system-level messages, sending fake account recovery prompts, and mimicking support calls. Be prepared!

Go to article at
10.1.2025

Our Santa wishlist: Stronger identity security for kids

As the holiday season approaches, Malwarebytes shines a light on a critical but often overlooked issue: the vulnerability of children’s identities in the digital age. Let's keep children safe from #cybercrime all year round! 🎄⏰

Go to article at
23.12.2024

8 Trends Reshaping Network Security in 2025

This article highlights why 2025 will be pivotal for cybersecurity, marked by innovation, adaptability, and new opportunities amid emerging challenges. Explore the top trends and get ready to stay ahead! ⭐️🛡️ #cybersecurity

Go to article at
20.12.2024

How the Cyber Essentials Certification Can Help Your Business

Recent studies show that 44% of UK businesses lack fundamental #cybersecurity skills, exposing them to potential cyber risks. Did you know, UK's Cyber Essentials is also available in Cyberday framework library 📚

Go to article at
20.12.2024