Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

Explore the top 10 responsibilities of a CISO and get best practices for success, covering risk management, collaboration, compliance, and continuous learning.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

article

25.10.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

article

1.8.2023

How remote work strengthens cybersecurity teams

Can remote work be used as strategic advantage? 🔋 The shift to remote work isn’t just a challenge—it’s a possibility. CISOs and professionals can leverage global talent, enhance security practices, and boost resilience. #cybersecurity

Go to article at
14.3.2025

How to prevent data leakage in collaboration tools like Slack and Teams

🛡️ Collaboration shouldn’t compromise security. Tools like Slack and Teams have become essential but they also introduce risks, so proactive actions e.g. access control, and employee training are key. 🔐 #dataprotection

Go to article at
7.3.2025

Six Critical Infrastructure Sectors Failing on NIS2 Compliance

⭐️ ENISA has noted six sectors struggling to comply with the NIS2. It's been almost 5 months since NIS2 came into action, but implementation is still taking place, e.g. national laws are still in progress in some countries. #cybersecurity

Go to article at
7.3.2025

The 5 stages of incident response grief

This article explores incident response from a new angle. Beyond technical fixes, good incident management requires clear detection & response tasks, systematic documentation, and proactive employee reporting.🚨 #cybersecurity

Go to article at
7.3.2025

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

Cybercriminals target nonprofits’ limited security resources to steal donor data, commit fraud & deploy ransomware. Action is needed—e.g. staff training on #phishing & fraud prevention is crucial to protecting assets & maintaining trust. 🛡️

Go to article at
7.3.2025

Leeds United Supporters Suffer Cyber Attack

⚽️ Leeds United suffered a cyber-attack in February, exposing customer card details. With rising phishing, card skimming & fraud, the sports industry must strengthen #cybersecurity to protect fan data. ⚽️

Go to article at
7.3.2025

Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

👀 What is MFA Fatigue? Attackers flood users with repeated MFA prompts, hoping they’ll approve one out of frustration or confusion—unknowingly granting access. Read how to defend against MFA fatigue, and stay secure! #cyberattack

Go to article at
28.2.2025

Cybersecurity needs a leader, so let’s stop debating and start deciding

💡 When it comes to #cybersecurity, businesses still struggle with ownership. In today’s threat landscape, this is a serious red flag - Cybersecurity is a business function, not just an IT concern.

Go to article at
28.2.2025

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Over 130,000 compromised devices are actively attempting logins using stolen credentials. To detect and mitigate these threats, security teams must prioritize monitoring Non-Interactive Sign-In logs. 🤖 🔐 #cybercrime

Go to article at
28.2.2025