Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Researchers found an "unintended interaction" with #cybersecurity worries: 🔓 When Chrome's Enhanced Spellcheck or Edge's MS Editor is enabled on your browser, the passwords you type on websites leak to Google and Microsoft.

Go to article at
23.9.2022

$35 Million Fine For Morgan Stanley After Unencrypted, Unwiped Harddrives Are Auctioned

💸 $35 million penalty for Morgan Stanley SEC’s enforcement division: "Improper disposal of thousands of hard drives since 2016 was an 'extensive failure' to safeguard customers’ data (as required by federal regulations)". #cybersecurity

Go to article at
23.9.2022

Malwarebytes blocks Google, YouTube as malware

An amusing #malware protection blunder: 📣 "Malwarebytes is aware of a temporary issue with the web filtering component of our product that may be blocking certain domains, including google.com"

Go to article at
23.9.2022

US government software suppliers must attest their solutions are secure

US gov agencies need to start gathering more evidence from software suppliers: ✅ self-attestation needed from suppliers before using the software ❌ if NIST requirements not followed, more explanation / assessments needed #cybersecurity

Go to article at
16.9.2022

To Ease the Cybersecurity Worker Shortage, Broaden the Candidate Pipeline

"With enough passion, raw intelligence, and hard work, anyone can be a successful #cybersecurity professional." ℹ️ Article has tips from an experienced CISO for battling the cyber security talent shortage.

Go to article at
16.9.2022

Researchers Warn of New Attack that can Unlock and Start Tesla Model Y in Seconds

💡 Researcher discovered an NFC relay attack #vulnerability, by which anyone w/ physical access to a Tesla Model Y can unlock and steal it in seconds. You need 2 thieves, one at the vehicle, one close to the owner. Details in article >>

Go to article at
16.9.2022

Say Hello to Crazy Thin ‘Deep Insert’ ATM Skimmers

💳 New #cybercrime tech: super-thin skimming devices, designed to fit inside an ATM's card slot. With these & hidden pinhole camers, crooks are after the magnetic stripe data and 4-digit PIN to clone payment cards.

Go to article at
16.9.2022

The Cost of a Data Breach for Government Agencies

💸 IBM: the cost of a #cyberattack on public administration is €2.06M. Internationally, these attacks are reported monthly. A large number of employees and varying security awareness increase attractiveness for cybercriminals.

Go to article at
9.9.2022

In-app browser security risks, and what to do about them

When you click a link to webpage inside an app (e.g. FB, TikTok), you don't get to your default browser - you stay in an embedded version. These in-app browsers have #privacy issues, they e.g. inject JS code so host apps track what you do.

Go to article at
9.9.2022