Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

Best Practices from ISO 27001 for Secure System Acquisition and Development: Create your NIS2 measures

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

article

16.4.2024

Build your NIS2 measures for Business Continuity and Backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

article

12.4.2024

Understanding HR Security Basics for ISO 27001 & NIS2 Compliance

Discover how the crucial role of HR in information security not only shapes the corporate security culture, but also steers the organization towards ISO 27001 and NIS2 compliance, ensuring secure handling of information assets and much more.

article

5.4.2024

Access Control & MFA (NIS2 21.2): Build A Solid Foundation with ISO 27001 Best Practices

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

article

4.4.2024

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Google has released a security update to fix a high-severity vulnerability in its Chrome browser. The bug allows remote attackers to exploit heap corruption via a specially crafted HTML page.🪲 🖥️ #vulnerability

Go to article at
23.8.2024

FBI Shuts Down Dispossessor Ransomware Group's Servers Across U.S., U.K., and Germany

This takedown reflects the global law enforcement effort to combat ransomware, though attackers continue to innovate, particularly by exploiting trusted relationships with contractors and service providers. 🚨 #ransomware

Go to article at
16.8.2024

Why scammers want your phone number

Phone numbers are central to various scams, including #phishing, smishing, SIM swaps, and call forwarding, which can lead to significant financial and data breaches. 📞⛔️

Go to article at
16.8.2024

Cybersecurity's Real Challenge Is Communication, Not Just Technology

Quick and seamless information sharing is essential for incident response, yet communication remains a significant challenge for security teams. 📣 #vulnerability

Go to article at
16.8.2024

Gold Mining Company Struck by Ransomware Attack

🚨 This #cyberattack follows a similar cyber incident in June involving another Australian mining firm, where sensitive employee data was compromised. In response, Australia has been strengthening its cybersecurity laws and regulations. 👑

Go to article at
16.8.2024

How CIOs, CTOs, and CISOs view cyber risks differently

Do you want to understand the executives better? This article underscores the importance of understanding and aligning the different priorities of CIOs, CTOs, and CISOs to develop effective #cybersecurity strategies. 💼🛡️

Go to article at
16.8.2024

Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited

August 3rd French Grand Palais experienced a suspected #ransomware attack targeting its financial data system, yet no significant disruption occurred. Cyberattacks have been expected during olympics, yet nothing bigger seems to have happened. 🚨

Go to article at
9.8.2024

CrowdStrike Reveals Root Cause of Global System Outages

Crowdstrike has been the talk of the whole world over the last month, and with good reasons. They now released a root cause analysis of the Falcon Sensor software update crash that affected millions of Windows devices globally. 🦅 #outage

Go to article at
9.8.2024

3 Types of Bot Attacks to Guard Against

Bot attacks pose a significant threat to businesses and individuals, with bad bots accounting for 32% of global web traffic in 2023. Effective bot management is essential to distinguish between legitimate and malicious bots. #dataprotection

Go to article at
9.8.2024