Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

NIS2: Who's in the scope and what security measures are required? (part 2/3)

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

NIS2: Working towards compliance with Cyberday (3/3)

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

7 reasons why cybercriminals want your personal data

As our interactions with digital technology deepen, our digital footprints expand, leaving a trail of valuable data that can be exploited by cybercriminals. But why our data is so appealing? Check also tips to protect yourself. 🔒 #privacy

Go to article at
26.4.2024

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

☕️ A phishing campaign has been exploiting a bug on Nespresso's website to bypass security measures by using nested or hidden links. This method exploits an open redirect vulnerability, redirecting victims from trusted domain. 🎣 #phishing

Go to article at
26.4.2024

Cannes Hospital Cancels Medical Procedures Following Cyberattack

🛡️ The Cannes Hospital recently experienced a #cyberattack, leading to a complete shutdown of computer systems as a containment measure. This forced hospital staff to revert to manual, paper-based methods to continue patient care. ✍️

Go to article at
26.4.2024

IT and Cybersecurity Jobs in the Age of Emerging AI Technologies

AI is significantly reshaping the IT and cybersecurity industries. There's concerns, but it also fosters innovation and operational efficiency and In cybersecurity, AI can help mitigate growing threats from cyberattacks. 🤖 #cybersecurity

Go to article at
26.4.2024

Behavioral Patterns of Ransomware Groups are Changing

📈 This report details significant changes in the ransomware threat landscape: Near 20% increase in ransomware victims. and major shifts in tactics by RaaS groups, particularly after law enforcement interventions. 🚨 #ransomware

Go to article at
26.4.2024

Cyberattack Takes Frontier Communications Offline

#cyberattack 🚨 Texas-based Frontier Communications has temporarily ceased operations due to a cyberattack on April 14, which compromised parts of its IT systems and led to the theft of personally identifiable information (PII). 📑

Go to article at
19.4.2024

Cybersecurity’s Human Factor: Merging Tech with People-Centric Strategies

💡 By prioritizing human-centric security and advanced proactive measures, organizations can forge a cybersecurity environment where technological robustness and user experience coexist harmoniously, setting new standards. #cybersecurity

Go to article at
19.4.2024

Thinking outside the code: How the hacker mindset drives innovation

In this article the value of ethical hacking in strengthening #cybersecurity measures was highlighted. Ethical hackers play a critical role in identifying vulnerabilities that even the most sophisticated companies might miss. 🛡️ 🚩

Go to article at
19.4.2024

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

🤖 Researchers have discovered that OpenAI's GPT-4 can exploit real-world system vulnerabilities described in CVE advisories with a high success rate. it successfully exploited 87% of the vulnerabilities tested 🛡️➡️ #vulnerability

Go to article at
19.4.2024