cyberdayapp Profile Banner
Cyberday Profile
Cyberday

@cyberdayapp

Followers
513
Following
187
Media
662
Statuses
3K

Cyberday splits chosen frameworks (e.g. #ISO27001, NIS2, #DORA) down to prioritized security tasks. Implemented as MS Teams integrated ISMS app.

Tampere, Suomi
Joined June 2017
Don't wanna be here? Send us removal request.
@cyberdayapp
Cyberday
7 months
Weekly #cybersecurity digest published! 🛡️ Cyberday newsletter includes recent news and articles, upcoming webinars and latest product development. Get weekly digest straight to your inbox 📨 https://t.co/JOuLPG1pRw https://t.co/sItBrzm8FH
us7.campaign-archive.com
Each Friday we gather the week's most important cyber security news, upcoming free webinars and latest Cyberday developement to this free newsletter.
0
0
0
@cyberdayapp
Cyberday
7 months
#Tietoturva työ on vaativaa mutta vaatii muutakin kuin taitoa - rajojen asettamista, luottamusta ja itsearviointia. CISO kertoo, miten hyvinvoinnin vaaliminen ja kannustava kulttuuri ehkäisevät uupumusta ja vahvistavat palautumiskykyä. https://t.co/bYhvPG6zvS
Tweet card summary image
helpnetsecurity.com
Cybersecurity is 24/7. Work-life balance takes trust, teamwork, and healthy habits to protect both your mind and mission.
0
0
0
@cyberdayapp
Cyberday
7 months
Balancing a #cybersecurity role takes more than skill: it takes boundaries, trust, and self-reflection.This CISO shares how prioritizing health, setting limits, and fostering a supportive culture help prevent burnout and build resilience. https://t.co/bYhvPG6zvS
Tweet card summary image
helpnetsecurity.com
Cybersecurity is 24/7. Work-life balance takes trust, teamwork, and healthy habits to protect both your mind and mission.
0
0
0
@cyberdayapp
Cyberday
7 months
Synteettinen identiteettivarkaus yhdistää varastettua ja keksittyä dataa – usein lasten tietoja. Näitä on vaikea tunnistaa, aiheuttaa miljarditappioita ja heikentää luottoluokituksia sekä vahingoittaa oikeita ihmisiä. ☠️ #kyberrikos https://t.co/P4B94V46Z7
0
0
0
@cyberdayapp
Cyberday
7 months
Synthetic identity fraud blends real and fake data to form convincing fake identities—often with stolen children's info. Hard to detect, it causes billions in losses, harms credit systems, and affects real people. ☠️ #cybercrime https://t.co/P4B94V46Z7
0
0
0
@cyberdayapp
Cyberday
7 months
Vuoden 2025 HIPAA-uudistukset kiristävät vaatimuksia: MFA, salaus ja riskianalyysit nousevat esiin. Uudistusten painopisteinä on esim.teleterveys, tekoäly, toimittajien valvonta ja vahvempi potilastiedon suoja. 🏥 #tietoturva https://t.co/NFn2ORs6u1
Tweet card summary image
securityboulevard.com
The U.S. Department of Health and Human Services (HHS) is rolling out new HIPAA regulations in 2025. It���s designed to strengthen patient privacy and security in the face of these changes. These HIPAA...
0
0
0
@cyberdayapp
Cyberday
7 months
New HIPAA rules in 2025 bring stricter #cybersecurity, with MFA, encryption, and risk analysis now required. Focus areas include telehealth, AI, vendor oversight, and stronger patient data access and privacy protections. 🏥 https://t.co/NFn2ORs6u1
Tweet card summary image
securityboulevard.com
The U.S. Department of Health and Human Services (HHS) is rolling out new HIPAA regulations in 2025. It’s designed to strengthen patient privacy and security in the face of these changes. These HIPAA...
0
0
0
@cyberdayapp
Cyberday
7 months
"Lopeta tilaus" -napit voivat piilottaa riskejä: Haitalliset linkit johtavat #tietojenkalastelu -sivustoille, ja pelkkä napin painaminen voi paljastaa, että osoite on aktiivinen ja lisätä kohdistettuja huijauksia. 🎣 https://t.co/oe2Ivgw55Q
Tweet card summary image
tivi.fi
Epäilyttävien sähköpostien linkkejä ei parane availla, vaikka ne väittäisivät tekevänsä jotain kätevää.
0
0
0
@cyberdayapp
Cyberday
7 months
GenAI tuo uuden #digiturva-riskin: hyökkääjät hyödyntävät AI:n "hallusinaatioita" levittämällä haitallista koodia, johon kehittäjät saattavat luottaa liikaa. Tarvitaan siis läpinäkyvyyttä ja vahvempia ohjelmistoketjun standardeja. 🧑‍💻 https://t.co/6tkgkgqFx9
Tweet card summary image
darkreading.com
Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains.
0
0
0
@cyberdayapp
Cyberday
7 months
GenAI is fueling a new #cybersecurity risk: attackers exploit AI "hallucinations" by uploading fake, malware-laced code that developers trust too easily. Clear AI transparency and software supply chain standards are urgently needed. 🧑‍💻 https://t.co/6tkgkgqFx9
Tweet card summary image
darkreading.com
Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains.
0
0
0
@cyberdayapp
Cyberday
7 months
88 % CISOista pelkää toimitusketjujen riskejä, mutta useimmat seuraavat vain suoria toimittajia. Vahva resilienssi vaatii reaaliaikaista näkyvyyttä ja tiivistä yhteistyötä myös epäsuorien kumppaneiden kanssa. 🌍 #tietoturva https://t.co/Ofb1kRRyhT
Tweet card summary image
theregister.com
: Who is the third party that does the thing in our thing? Yep. Attacks explode over past year
0
0
0
@cyberdayapp
Cyberday
7 months
88% of CISOs worry about supply chain risk, yet most don’t monitor beyond direct vendors. With 3rd-party attacks surging, true #cybersecurity resilience means real-time visibility and deeper vendor collaboration. 🌍 https://t.co/Ofb1kRRyhT
Tweet card summary image
theregister.com
: Who is the third party that does the thing in our thing? Yep. Attacks explode over past year
0
0
0
@cyberdayapp
Cyberday
7 months
Weekly #cybersecurity digest published! 🛡️ Cyberday newsletter includes recent news and articles, upcoming webinars and latest product development. Get weekly digest straight to your inbox 📨 https://t.co/JOuLPG1pRw https://t.co/rbshCdnTup
us7.campaign-archive.com
Each Friday we gather the week's most important cyber security news, upcoming free webinars and latest Cyberday developement to this free newsletter.
0
0
0
@cyberdayapp
Cyberday
7 months
NIST on julkaisut uuden ohjeistuksen, joka auttaa organisaatioita ottamaan käyttöön zero trust -mallin käytännössä. Se sisältää 19 esimerkkiä työkalujen käyttämisestä yleisten ongelmien ratkaisemiseksi. #tietoturva 🛡️ https://t.co/lFPLtNQY8t
Tweet card summary image
infosecurity-magazine.com
The new NIST guidance sets out 19 example implementations of zero trust using commercial, off-the-shelf technologies
0
0
0
@cyberdayapp
Cyberday
7 months
NIST has released new guidance to help orgs implement zero trust in real-world settings. It offers 19 example builds using commercial tools to tackle common challenges. A key step forward for practical #cybersecurity 🛡️ https://t.co/lFPLtNQY8t
Tweet card summary image
infosecurity-magazine.com
The new NIST guidance sets out 19 example implementations of zero trust using commercial, off-the-shelf technologies
0
0
0
@cyberdayapp
Cyberday
7 months
🤖 #tietoturva muutttuu Agentic AI:n myötä, kun se havaitsee uhat ja automatisoi reagoimisen. Virheellisten tietojen tai heikon valvonnan myötä se voi kuitenkin olla vain haitaksi. Tehokas valvonta on keskiössä, kun käyttö laajenee. 🛡️ https://t.co/lsLZH7uWSE
Tweet card summary image
helpnetsecurity.com
This is a practical look at how agentic AI is entering the enterprise and what every CISO should know to stay secure.
0
0
0
@cyberdayapp
Cyberday
7 months
🤖 Agentic AI is changing #cybersecurity by detecting threats and automating response. But with bad data or poor oversight, it can backfire. Smart use and strong governance are key as adoption grows. 🛡️ https://t.co/lsLZH7uWSE
Tweet card summary image
helpnetsecurity.com
This is a practical look at how agentic AI is entering the enterprise and what every CISO should know to stay secure.
0
0
0
@cyberdayapp
Cyberday
7 months
Muistivirhe palvelimissa antoi tutkijoille mahdollisuuden seurata salaa hakkeriryhmän toimia kolme vuotta. He löysivät varastettua dataa sekä hakkeritietoja, osoittaen että kyberrikollisetkin voivat tehdä virheitä. #kyberrikos https://t.co/6KGwubV7c1
Tweet card summary image
darkreading.com
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
0
0
0
@cyberdayapp
Cyberday
7 months
A memory bug in servers let researchers secretly watch the malware group's actions for 3 years. They found stolen data, private keys, and hacker info—showing even cybercriminals can slip up with their own security. #cybercrime https://t.co/6KGwubV7c1
Tweet card summary image
darkreading.com
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
0
0
0
@cyberdayapp
Cyberday
7 months
Herokun #käyttökatko 10.6. vaikutti myös Digiturvamallin saatavuuteen. Dataa ei vaarantunut, mutta tapaus toimi hyvänä hetkenä tarkastella ja parantaa häiriöiden hallintaa. 🚨 https://t.co/c7pCw3JCiQ
Tweet card summary image
bleepingcomputer.com
Heroku is suffering a widespread outage that has lasted over six hours, preventing developers from logging into the platform and breaking website functionality.
0
0
1