Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

article

19.12.2024

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

article

18.12.2024

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

article

3.12.2024

Recognising growth: move to new offices with Cyberday!

Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.

article

28.11.2024

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Proposed HIPAA Amendments Will Close Healthcare Security Gaps

HHS is proposing significant updates to the HIPAA to address today’s evolving cyber threats. These proposed updates reflect the growing urgency to secure healthcare systems in an increasingly dangerous cyber landscape. 🏥 #cybersecurity

Go to article at
22.1.2025

Understanding AI in Network Security

AI is changing #cybersecurity by making it faster and more adaptable to modern threats. However, it works best when combined with basic security measures and guided by human oversight for ongoing improvement. 🤖🌪️

Go to article at
22.1.2025

The biggest cybersecurity and cyberattack stories of 2024

2024 brought significant challenges to the #cybersecurity landscape, with major breaches, ransomware attacks, and new threats making headlines. Read about the most impactful events and stay vigilant. ➡️ 🛡️

Go to article at
22.1.2025

Ransomware gang leaks data stolen in Rhode Island's RIBridges Breach

🚨 #ransomware gang has begun leaking data stolen in a breach of Rhode Island’s social services platform, affecting approximately 650,000 individuals. The stolen data includes databases, backups, and other sensitive information. 📭

Go to article at
22.1.2025

Machine identities are the next big target for attackers

According to report, cloud native environments are becoming prime targets for #cyberattack , with alarming consequences. 77% see AI poisoning as a looming supply chain threat, and 69% call securing cloud-to-data-center access a "nightmare" 📈

Go to article at
22.1.2025

Phishing Report Findings Call for a Fundamental Shift in Organizational Approaches to Defense

📊 SlashNext’s report shows how phishing has evolved far beyond traditional email scams, becoming a multi-faceted threat across various platforms. 🎣 #phishing

Go to article at
22.1.2025

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Cyber threats don’t take holidays — and neither should defenses. Plan now to protect your business and enjoy a stress-free holiday seasons. 🎄 #cybercrime

Go to article at
22.1.2025

What open source means for cybersecurity

The open-source ecosystem poses significant risks due to outdated components and insecure dependencies, exposing organizations to potential threats. Read key takeaways from open-source security reports. ➡️📈 #vulnerability

Go to article at
22.1.2025

Hacker Leaks Cisco Data

A hacker recently leaked data from Cisco’s public-facing DevHub, claiming it's just a fraction of what was taken in October. Cisco confirmed the data was accessed due to a configuration error, not a system breach.🚨 #cybercrime

Go to article at
22.1.2025