In the final episode of our deep-dive into Middle East cyber- and information warfare, we take a closer look at Iran.
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
Israeli Cyberwarfare History and Capabilities

In the latest of our State of (Cyber)War discussions, we cover Israel’s cyber- and information warfare organization, capabilities, and activities.
Combatting Technology-Facilitated Abuse and Violence: A Call to Action
Imagine living in constant fear, knowing that every online interaction could be monitored, every move tracked and every personal detail exploited by an abusive partner. This is the harsh reality for millions of individuals worldwide who are victims of technology-facilitated abuse (TFA) and technology-facilitatedviolence (TFV). As technological advancements progress, the escalation of abuse has outpaced […]
In Defense of eSafety: Upholding Democratic Processes in the Digital Age
As cybersecurity professionals, we at the Cybersecurity Advisors Network (CyAN) are acutely aware of the critical role that technology plays in shaping our society. As our primary focus is on information security, data protection as well as Trust & Safety, we recognise the broader implications of technology-related issues that impact public safety, democracy, and the […]
CyAN Video/Podcast – Linux Malware and Security, With Craig Rowland
The latest episode of CyAN’s Secure-in-Mind video and podcast series features Craig Rowland, CEO and founder of New Zealand-based Sandfly Security.32 “The Internet runs on Linux” – over 90% of the top million websites run on Linux, and it’s a critical part of the global Internet, used for a huge range of applications – industrial […]
Cyber Conflict in the Middle East – Round One

In the latest of our series of discussions on CyAN’s YouTube channel “State of (Cyber)War” playlist about cyber conflict and -capabilities, Hugo Tarrida and John Salomon talk about the background and current state of cyber conflict in the Middle East.
How Mistral’s Partnership with Microsoft Secures its Future in the Competitive AI Landscape

AI is causing unprecedented changes that are both creating new opportunities and transforming individuals, businesses, and society. The current AI landscape is characterised by increased competition and dependence on a small number of dominant players. These players have the talent, resources, data, and a willing mindset to reach into their deep pockets to succeed. As […]
Securing Tomorrow: The Pivotal Role of Quantum Computing in Cybersecurity
This simple yet powerful statement highlights the immense potential of quantum computing to revolutionize the cybersecurity landscape. While still in its early stages of development, quantum computers possess the game-changing ability to perform calculations that are impossible for even the most powerful classical computers. This ground breaking technology presents both exciting opportunities and daunting challenges […]
Beyond Employment: How AI Will Transform the Economy and Society for better or worse.

“Any sufficiently advanced technology is indistinguishable from magic” was a poignant observation by Arthur C. Clarke in 1973. I find this quote befitting our reality where the pace of change brought about by technology is unparalleled. It implies that we often have unrealistic expectations about the immediate opportunities or challenges of new technologies while underestimating […]
Coordinated Vulnerability Disclosure – Europe Has Some Work to Do

Coordinated cybersecurity vulnerability disclosure (CVD) policies in Europe are unfortunately not universal; likewise, legislation to protect ethical hackers still has a way to go. The European Cybersecurity Agency (ENISA) could do more at an EU-wide level to help good faith researchers protect critical digital resources.