An overview of cybersecurity spend in international banks
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
Dynamic Resilience: A Framework for Synergizing Operational Agility and Economic Security in the Era of Digital Transformation by Rupesh Shirke

Abstract In today’s rapidly evolving digital landscape, organizations face unprecedented challenges that necessitate establishing a robust framework to navigate operational agility and economic security. This document delves into dynamic resilience, harmoniously integrating these vital components to foster sustainable growth, adaptability, and long-term success. Through a comprehensive examination of the interplay between agility and security, we […]
CyAN’s Position on Encryption Backdoor Legislation

CyAN statement opposing the French “Narcotrafic” amendment allowing law enforcement access to encrypted messages, and Sweden’s proposed requirement for back doors into end-to-end encryption
Open Letter – Support for Responsible Cybersecurity Vulnerability Disclosure in Germany

CyAN supports the open letter to the incoming German government advocating for legal clarity in protecting good faith cybersecurity vulnerability researchers.
Safer Internet Day: The Business Model of Cyber Attacks in the Digital Era by Saba Bagheri, PhD

Every year, Safer Internet Day reminds us of the importance of making the internet a safer place for everyone. Initially conceived as a tool to connect people and make life more convenient, the internet has evolved into a cornerstone of modern living. Yet, it has also become a breeding ground for a darker reality: the […]
DeepSeek: Revolutionizing Operational Technology by Rupesh Shirke

In today’s fast-paced industrial landscape, the integration of advanced technologies in operational processes is no longer optional; it’s essential. DeepSeek stands at the forefront of this transformation, offering innovative solutions that enhance efficiency, safety, and productivity across various sectors. At its core, DeepSeek leverages cutting-edge artificial intelligence and machine learning algorithms to analyze vast amounts […]
Smart Security Everywhere: Empowering CXOs with Always-On Protection

by Shantanu Bhattacharya Posted on February 20, 2025 | Originally published on RSAC Conference 🔗 Read the original article on RSAC Conference In today’s digital-first business landscape, Chief Experience Officers (CXO) are frequently on the move, driving business growth outside the organization’s secure network perimeter. However, this mobility comes with a significant risk: their laptops, […]
Opinion: Disinformation, Attacks on Society, and Our Responsibility as Infosec Professionals

The world’s full of information-borne threats to society – from active baddies to those who support them. As professionals, there is a lot we can and should do to stop these.
The Augmented CISO: How AI is Transforming Cybersecurity Compliance

As cybersecurity regulations tighten, AI is transforming the CISO’s role, automating audits, enhancing risk assessments, and ensuring real-time compliance with NIS2, DORA, and the AI Act. While AI streamlines security governance, challenges around transparency and bias remain. This article explores how Retrieval-Augmented Generation (RAG) enhances traceability and reliability in cybersecurity compliance.
Behind the Posts: How I Identify My Top 10 Cyber Threat Groups Each Week by Dan Elliott

How I separate noise from real risk… I’ve been asked numerous times how I select the threat groups I write about – why one and not another. So, I thought I’d take a perfectly good Sunday afternoon to share. MITRE currently tracks at least 133 cyber threat groups and Microsoft more than 1,500. Much like […]