📄 Download Feature PDF Want to connect? Here is Daniela Fernandez’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
CyAN Signs 3 Open Letters Against Surveillance Laws

We have added CyAN’s signature to 3 open letters against surveillance overreach in Sweden, Japan, and the United States
Behind the Keys: Women Who Secure the Future – Irene Corpuz

📄 Download Feature PDF Want to connect? Here is Irene Corpuz’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives

Defining Digital Sovereignty in Our Times In his thought-provoking article, “Digital Sovereignty: A Framework for the Internet Age,” Robin Berjon skilfully outlines the challenges and necessities of digital sovereignty. This article builds on his foundation, delving deeper into nuanced facets of digital sovereignty and highlighting critical issues such as the essential role of end-to-end encryption […]
Webinar – Image-Based Sexual Abuse (IBSA)

A webinar discussion on how together we can break the Cycle to combat Online Image-Based Sexual Abuse for a Safer Digital Experience
Navigating Uncharted Waters: The EU’s Digital Markets Act and Its Impact on Security

The European Union’s Digital Markets Act (DMA) is setting the stage for significant changes in the tech landscape, particularly for companies like Apple, known for their tightly controlled ecosystems. While the DMA aims to enhance competition and consumer choice by opening up platforms like iOS to third-party app stores and facilitating app sideloading—where users can […]
“What happens to Heroes ?” EPISODE #2: The Unsung Heroes of the digital world by Didier Annet

The Psychological Impacts of Cyberattacks This is the second episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” Which role within a company can become a Hero? And why? “The fact is, […]
Securing the Future: Innovative Cybersecurity for Agentic AI by Shantanu Bhattacharya
Agentic AI is when autonomous AI agents make decisions and execute tasks. It’s poised to revolutionize industries. But with this power comes new cybersecurity challenges. This blog explores the deployment architectures of agentic AI solutions and identifies key attack vectors, offering a glimpse into innovative cybersecurity defenses. Agentic AI Deployment Architecture Agentic AI systems typically […]
Fostering Australia’s Autonomy: The Imperative for Sovereign Satellite Communication Systems

Inspired by recent movements in Europe, where tech giants like Airbus have advocated for a sovereign fund to support local technology sectors, this article explores Australia’s strategic need to develop sovereign satellite communication systems. As digital connectivity becomes increasingly crucial, the time to fortify our independence and security is now. The Strategic Need for Sovereign […]