Recent Posts
Cyber (In)Securities – Issue 188
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Introducing the mentors of the CyAN Global Mentorship Programme | March–May 2026
We are proud to welcome an outstanding group of mentors who will be supporting the March 2026 intake of the CyAN Global Mentorship Programme. This mentor cohort represents deep, real-world experience across cybersecurity, privacy, risk, governance, law, artificial intelligence, and trust and safety. Based across …
Week 6 – When ++ Turns into a Minus
2 – 8 Feb 2026 Earlier this week, a security advisory reported a high-severity vulnerability in Notepad++, rated CVSS 7.7. But first of all, what is Notepad++? For those who may not be familiar with it, Notepad++ is a free, open-source text and source code …
Please welcome our newest member from Barcelona, Spain, Ahmet Can Kan
Ahmet Can Kan is a cybersecurity professional with hands-on experience across offensive security, digital forensics, and threat intelligence. His work focuses on understanding adversary behaviour end to end, from initial access through to impact, and translating real-world attack techniques into practical defensive improvements. Ahmet is …
Cyber (In)Securities – Issue 187
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Week 5 – Trusted by Default: Why Microsoft Office Remains a Prime Target
26 Jan – 1 Feb 2026 This week’s CVE of the Week highlights an actively exploited security feature bypass vulnerability in Microsoft Office. Microsoft Office is an office suite and a family of client software, server software, and services developed by Microsoft.It’s one of the …
Cyber (In)Securities – Issue 186
You can download this edition by clicking the three dots icon on the far right and selecting Download PDF File. For the best reading experience, we recommend enlarging it by clicking the fullscreen icon, which is the third icon from the right. All article titles …
Beyond Compliance: Building Continuous Confidence in Risk, Governance, and Cybersecurity by Pathan Humam
Across industries, organizations are investing heavily in cybersecurity controls, compliance frameworks, and assurance programs. Yet many leadership teams still struggle to answer a simple but critical question with confidence: “What is our risk posture right now—and can we trust it?” As cyber threats accelerate, regulatory …






