AI Security Challenge 

AI Security Challenge 

The landscape of AI security presents a unique challenges. Adversaries are increasingly sophisticated, aiming to manipulate AI models, exfiltrate sensitive data, or exploit vulnerabilities within AI systems for various malicious ends. On top they are using /consuming millions of feeds , so we are looking 

Not Just European, But Trustworthy: What DNS4EU Reminds Us About Sovereignty, Surveillance, and (Actual) Security

Not Just European, But Trustworthy: What DNS4EU Reminds Us About Sovereignty, Surveillance, and (Actual) Security

When Infrastructure Becomes Political Once upon a time, infrastructure was invisible. It quietly kept the world running – roads, pipes, power grids, protocols. You only noticed it when it broke. But digital infrastructure isn’t invisible anymore. It’s political. It’s strategic. And increasingly, it’s personal. In 

03:17 AM: When Everything Goes Wrong by Jonathan Wood

03:17 AM: When Everything Goes Wrong by Jonathan Wood

There is a very specific time of day when it all seems to fall apart. For Cyber Security, that time is around 03:17 AM. If you’re in security, you will recognise this feeling, the kind of sensation where you feel there is an elephant in 

Too Big to Fail, Too Centralised to Survive: What 16 Billion Leaked Logins Tell Us About the Wrong Kind of Scale

Too Big to Fail, Too Centralised to Survive: What 16 Billion Leaked Logins Tell Us About the Wrong Kind of Scale

When 16 billion credentials turn up in a single breach compilation, it should shake us. But it doesn’t. Not anymore. And that’s the problem. In the latest reminder that password-based security is a brittle mess, security researchers revealed a mega-leak containing more than 16 billion 

“What happens to Heroes?” EPISODE #7: The Unsung Heroes of the digital world “

“What happens to Heroes?” EPISODE #7: The Unsung Heroes of the digital world “

The Psychological Impacts of Cyberattacks What I will call the “Heroes” Excerpts from Interviews with Heroes THINGS TO REMEMBER About the Author Didier Annet is an Operational & Data Resilience Specialist and a Certified Professional Coach dedicated to empowering individuals and teams to navigate the 

CyAN’s Position on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement

CyAN’s Position on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement

CyAN opposes recommendations made by the European Commission’s High-Level Group on Access to Data for Effective Law Enforcement (HLG).

Hack the Planet? No. Just Hack the Tap: What exposed water systems tell us about the state of cybersecurity around the world

Hack the Planet? No. Just Hack the Tap: What exposed water systems tell us about the state of cybersecurity around the world

Final thought About the Author: Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions. She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Board Member Spotlight: Adj. Prof. Dr. Greg Dzsinich, LLM, CIPP/E

Board Member Spotlight: Adj. Prof. Dr. Greg Dzsinich, LLM, CIPP/E

One idea that continues to guide his leadership comes from his time at Microsoft. When he joined the company in 2008, he was struck by a powerful metaphor. If we sit in one boat, we must not only row well. We must also remain in 

“What happens to Heroes?” EPISODE #6: The Unsung Heroes of the digital world by Didier Annet

“What happens to Heroes?” EPISODE #6: The Unsung Heroes of the digital world by Didier Annet

The Psychological Impacts of Cyberattacks What I will call the “Heroes” Let’s Rewrite the Story of a Cyberattack – Alternate History of a winning scenario Excerpt From the Interview Typical identification factor: “Right reflexes, right roles — from click to crisis” About the Author Didier 

CyAN Mentorship Wrap-Up – 2025-1

CyAN Mentorship Wrap-Up – 2025-1

CyAN is nearing the end of its spring 2025 mentorship programme. We extend a sincere thank you to our members who have agreed to contribute to the development of new talent entering the information security sector: Saba Bahgeri (Australia), Mohammed Shakil Khan (UAE), Mathew Nicho