Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

NIS2: Who's in the scope and what security measures are required? (part 2/3)

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Google has released a security update to fix a high-severity vulnerability in its Chrome browser. The bug allows remote attackers to exploit heap corruption via a specially crafted HTML page.🪲 🖥️ #vulnerability

Go to article at
23.8.2024

FBI Shuts Down Dispossessor Ransomware Group's Servers Across U.S., U.K., and Germany

This takedown reflects the global law enforcement effort to combat ransomware, though attackers continue to innovate, particularly by exploiting trusted relationships with contractors and service providers. 🚨 #ransomware

Go to article at
16.8.2024

Why scammers want your phone number

Phone numbers are central to various scams, including #phishing, smishing, SIM swaps, and call forwarding, which can lead to significant financial and data breaches. 📞⛔️

Go to article at
16.8.2024

Cybersecurity's Real Challenge Is Communication, Not Just Technology

Quick and seamless information sharing is essential for incident response, yet communication remains a significant challenge for security teams. 📣 #vulnerability

Go to article at
16.8.2024

Gold Mining Company Struck by Ransomware Attack

🚨 This #cyberattack follows a similar cyber incident in June involving another Australian mining firm, where sensitive employee data was compromised. In response, Australia has been strengthening its cybersecurity laws and regulations. 👑

Go to article at
16.8.2024

How CIOs, CTOs, and CISOs view cyber risks differently

Do you want to understand the executives better? This article underscores the importance of understanding and aligning the different priorities of CIOs, CTOs, and CISOs to develop effective #cybersecurity strategies. 💼🛡️

Go to article at
16.8.2024

Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited

August 3rd French Grand Palais experienced a suspected #ransomware attack targeting its financial data system, yet no significant disruption occurred. Cyberattacks have been expected during olympics, yet nothing bigger seems to have happened. 🚨

Go to article at
9.8.2024

CrowdStrike Reveals Root Cause of Global System Outages

Crowdstrike has been the talk of the whole world over the last month, and with good reasons. They now released a root cause analysis of the Falcon Sensor software update crash that affected millions of Windows devices globally. 🦅 #outage

Go to article at
9.8.2024

3 Types of Bot Attacks to Guard Against

Bot attacks pose a significant threat to businesses and individuals, with bad bots accounting for 32% of global web traffic in 2023. Effective bot management is essential to distinguish between legitimate and malicious bots. #dataprotection

Go to article at
9.8.2024