Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

System acquisition and development in NIS2: Suggested best practices

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

How remote work strengthens cybersecurity teams

Can remote work be used as strategic advantage? 🔋 The shift to remote work isn’t just a challenge—it’s a possibility. CISOs and professionals can leverage global talent, enhance security practices, and boost resilience. #cybersecurity

Go to article at
14.3.2025

How to prevent data leakage in collaboration tools like Slack and Teams

🛡️ Collaboration shouldn’t compromise security. Tools like Slack and Teams have become essential but they also introduce risks, so proactive actions e.g. access control, and employee training are key. 🔐 #dataprotection

Go to article at
7.3.2025

Six Critical Infrastructure Sectors Failing on NIS2 Compliance

⭐️ ENISA has noted six sectors struggling to comply with the NIS2. It's been almost 5 months since NIS2 came into action, but implementation is still taking place, e.g. national laws are still in progress in some countries. #cybersecurity

Go to article at
7.3.2025

The 5 stages of incident response grief

This article explores incident response from a new angle. Beyond technical fixes, good incident management requires clear detection & response tasks, systematic documentation, and proactive employee reporting.🚨 #cybersecurity

Go to article at
7.3.2025

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

Cybercriminals target nonprofits’ limited security resources to steal donor data, commit fraud & deploy ransomware. Action is needed—e.g. staff training on #phishing & fraud prevention is crucial to protecting assets & maintaining trust. 🛡️

Go to article at
7.3.2025

Leeds United Supporters Suffer Cyber Attack

⚽️ Leeds United suffered a cyber-attack in February, exposing customer card details. With rising phishing, card skimming & fraud, the sports industry must strengthen #cybersecurity to protect fan data. ⚽️

Go to article at
7.3.2025

Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

👀 What is MFA Fatigue? Attackers flood users with repeated MFA prompts, hoping they’ll approve one out of frustration or confusion—unknowingly granting access. Read how to defend against MFA fatigue, and stay secure! #cyberattack

Go to article at
28.2.2025

Cybersecurity needs a leader, so let’s stop debating and start deciding

💡 When it comes to #cybersecurity, businesses still struggle with ownership. In today’s threat landscape, this is a serious red flag - Cybersecurity is a business function, not just an IT concern.

Go to article at
28.2.2025

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Over 130,000 compromised devices are actively attempting logins using stolen credentials. To detect and mitigate these threats, security teams must prioritize monitoring Non-Interactive Sign-In logs. 🤖 🔐 #cybercrime

Go to article at
28.2.2025