New Podcast – Return of the Bride of Terrorism, With Bjørn Ihler

New Podcast – Return of the Bride of Terrorism, With Bjørn Ihler

Part III in our series on violent extremism and terrorism

“What Happens to Heroes?” – Episode #5: The Unsung Heroes of the Digital World

“What Happens to Heroes?” – Episode #5: The Unsung Heroes of the Digital World

The Psychological Impacts of Cyberattacks This is the fifth episode in our ongoing series about the individuals who, in a matter of moments, transition from employees to rescuers in the aftermath of a destructive cyberattack. These are what I call the “Heroes.” Let’s Rewrite the 

Implicit Privacy is Dead – A Counterpoint (Sort Of)

Implicit Privacy is Dead – A Counterpoint (Sort Of)

A rebuttal: camera sunglasses aren’t the unique adversary you might think they are.

New Podcast – Some More Terrorism, With Bjørn Ihler

New Podcast – Some More Terrorism, With Bjørn Ihler

Bjørn and John return to discuss additional aspects of terrorism and extremism

AI Can’t Fix What’s Fundamentally Broken by Michael McDonald

AI Can’t Fix What’s Fundamentally Broken by Michael McDonald

AI has potential. But it is not a magic wand

Not a Good Look, AI: What Happens to Privacy When Glasses Get Smart?

Not a Good Look, AI: What Happens to Privacy When Glasses Get Smart?

They look just like a regular pair of Ray-Bans. But behind the dark lenses?Cameras. Microphones. AI-powered assistants. All quietly recording, analysing, and storing data, sometimes even in real-time. And unless you’ve signed up for a starring role in someone else’s life capture experiment, you probably 

The Human Factor in OT Security Incidents: Understanding Insider Threats and Social Engineering in Critical Infrastructure by Rupesh Shirke

The Human Factor in OT Security Incidents: Understanding Insider Threats and Social Engineering in Critical Infrastructure by Rupesh Shirke

Introduction The human factor is an essential but overlooked security component in Operational Technology (OT) systems within critical infrastructure. However, although many technological defenses have improved, insider threats and social engineering remain serious due to inherent human activity and organizational culture vulnerabilities. Operators of OT 

Used, Not Consulted: When AI Trains on Our Work Without Consent

Used, Not Consulted: When AI Trains on Our Work Without Consent

CyAN Context At CyAN, we often talk about trust, governance, and transparency aspillars of a secure digital future. But what happens when thoseprinciples are ignored, not in a breach or a ransomware attack, but inthe slow, quiet erosion of creator rights? As a cybersecurity professional 

New Podcast – Let’s Talk Terrorism, With Bjørn Ihler

New Podcast – Let’s Talk Terrorism, With Bjørn Ihler

Bjørn Ihler joins us on the latest installment of our Secure-in-Mind series to share his experience and insights around terrorism, both online and offline.

Special Feature – 10th Anniversary

Special Feature – 10th Anniversary

Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at