Recent Posts

Cyber (In)Securities – Issue 196

Cyber (In)Securities – Issue 196

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

When “Compliance” Becomes a Proxy for Trust

When “Compliance” Becomes a Proxy for Trust

Over the past few days, a story has been doing the rounds about a fast-growing compliance startup and its sudden parting of ways with a major backer. It’s easy to get pulled into the specifics, the allegations, the responses, and the inevitable back-and-forth. But I 

It Installed Cleanly, That Was the Problem by Michael T. McDonald

It Installed Cleanly, That Was the Problem by Michael T. McDonald

There’s a persistent assumption in software security that something has to visibly fail before a system is compromised. A vulnerability is exploited, a control is bypassed, or a configuration is misapplied. In most post-incident narratives, there is a clear point where things go wrong. This 

New Podcast – Shantanu Bhattacharya:  What do File Security and LLM Optimisation Have in Common?

New Podcast – Shantanu Bhattacharya: What do File Security and LLM Optimisation Have in Common?

CyAN member Shantanu Bhattacharya discusses file security and LLM performance

Please welcome our newest member from France, Liliane UWIZEYE

Please welcome our newest member from France, Liliane UWIZEYE

Liliane supports CISOs and SOC/VOC/CERT Managers in driving and optimizing their cyber defense capabilities by aligning detection and response with priority threats, business risks, and real exposure, to accelerate their maturity. Her expertise includes Security Operations, risk management, vulnerability management, and audit readiness (ISO27001, GDPR, 

Week 14 – Cracked Open: A Critical F5 Flaw Hiding Inside the Easter Egg

30 Mar – 05 Apr 2026 Our CVE of the Week is about BigIP APM which consolidates remote, mobile, network, virtual, and web access. With BIG-IP APM, you can create, enforce, and centralize simple, dynamic, intelligent application access policies for all of your apps, regardless 

Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald

Python Didn’t Bite, the Supply Chain Did by Michael T. McDonald

There’s a particular kind of failure in modern software that doesn’t announce itself with alarms or outages. No flashing dashboards, no immediate disruption. Everything appears to be working exactly as expected. Until, quietly and without ceremony, it isn’t. A widely used Python package, pulled in 

Signals Over Substance: Navigating the Attention Economy

Signals Over Substance: Navigating the Attention Economy

In a recent article (see link in the comments below), I revisited a framework I developed more than a decade ago while writing Flat World Navigation, Collaboration and Networking. At the time, I was trying to make sense of what felt like a shifting economic 

Cyber (In)Securities – Issue 195

Cyber (In)Securities – Issue 195

You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles 

Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser

Livre Blanc CyAN – Loi 05-20, ISO27001 et Résilience Cyber – Mars 2026 by Gilles Chevillon and Aymane Nasser

You can download this PDF by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. Loi 05-20 et