January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
Identity: The New Perimeter for Organisational Cybersecurity in the Age of Competitive AI

In today’s hyper-connected, rapidly evolving digital landscape, traditional cybersecurity paradigms no longer suffice. The perimeter-based approach, which relied on securing the network boundary, has become obsolete as organizations increasingly adopt cloud computing, remote work, and AI-driven tools. The competitive nature of artificial intelligence (AI) further intensifies this shift, as both attackers and defenders leverage AI […]
China’s Open-Source AI: The genie is out of the bottle, and the race is on

China’s AI ambitions have been making headlines for years, but recent developments have thrown a curveball into the global tech landscape. DeepSeek, a Chinese AI company, has managed to develop a top-tier AI model despite facing significant sanctions and restrictions. And here’s the kicker—it’s open source. While open-source AI isn’t new (META’s LLaMA models have […]
A Day in the Life of a Seasoned Security Analyst: Transforming Cybersecurity with 360Sequrity Solutions By Shantanu Bhattacharya

Let me take you on a journey through the eyes of Alex, a seasoned security analyst at SecureBank, a global financial institution. Alex’s team is responsible for protecting sensitive customer data from increasingly sophisticated cyberattacks. Every day is a battle, but this one is about to be different. The Old Normal: A Day of Chaos […]
State of (Cyber)War Ep. 8.2 – Military Cryptology, Part II

Hugo Tarrida and John Salomon talk about the history of military encryption, from the Cold War until today, part of CyAN’s State of (Cyber)War podcast series.
How EDR/XDR Technologies Enhance Data Privacy and Their Implications for AI Governance

In today’s digital world, data privacy has become a paramount concern for organizations and individuals alike. As cyber threats grow increasingly sophisticated, organizations turn to robust security solutions like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) to safeguard sensitive data. Beyond their immediate role in mitigating cyber risks, these technologies also […]
New Podcast: Military Cryptology, Part I

Cryptography and Cryptanalysis – Military Applications From Antiquity to the End of World War II Join our motivated more-or-less informed amateurs Hugo Tarrida and John Salomon for the latest in our State of (Cyber)War series, part of CyAN’s Secure in Mind video and podcast network. This is part one of a two-part series; part II […]
The Cybersecurity Landscape in 2025: Top Predictions and Implications for Leaders

🔒 The Cybersecurity Landscape in 2025: What Every Leader Needs to Know 🔒
As we step into 2025, the world of cybersecurity is more dynamic—and more critical—than ever before. The rapid evolution of technology brings both unprecedented opportunities and formidable challenges. Cybercriminals are getting smarter, state-sponsored threats are on the rise, and emerging technologies like quantum computing are reshaping the risk landscape.
In my latest LinkedIn blog, I dive into the top five cybersecurity predictions for 2025, exploring the trends that will shape our strategies, investments, and priorities in the coming year.
From the rise of AI-driven threats and state-sponsored cyber warfare to advancements in quantum-resilient cryptography and the adoption of Zero-Trust Architecture, this post takes a comprehensive look at what lies ahead. More importantly, I outline what these developments mean for leaders like you—across cybersecurity, business, and beyond.
This isn’t just about managing risks—it’s about preparing for the future, building resilience, and turning challenges into opportunities.
👉 Read the full blog below and join the conversation. Let’s shape the future of cybersecurity together!
#Cybersecurity #Leadership #Innovation #ZeroTrust #AI
Resilience or Regulation? Europe’s Digital Transformation at a Crossroads

As Europe introduces the NIS2 Directive and the Digital Operational Resilience Act (DORA), the continent faces a pivotal question: Are these regulatory frameworks merely a defensive response to rising cyber threats, or are they a foundation for a more resilient and innovative digital ecosystem? This article explores how these initiatives intertwine regulation with resilience, shaping Europe’s role in the global digital landscape.