The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
From Targets to Co-Designers: Empowering Gen Z in the Age of AI
Gen Z is the first generation to grow up entirely within an AI-powered world. From school apps that track their attention spans to platforms that curate their every scroll, they’ve been nudged, measured, and profiled by algorithms long before most could give meaningful consent. And …
Quantum Apocalypse: Fortifying Critical Infrastructure in the Age of Cyber Warfare by Sapann Harish Talwar
Quantum computing is no longer a future concept. It is becoming a reality that brings both breakthroughs and significant cybersecurity risks. This paper explores what experts are calling the “Quantum Apocalypse,” a future scenario where quantum computers have the power to break today’s encryption methods. …
What happens to Heroes?” EPISODE #8: The Unsung Heroes of the digital world by Didier Annet
The Psychological Impacts of Cyberattacks What I will call the “Heroes” The psychological impacts hitting the Heroes. “Yes, I’m different today. Insecurity is much more prevalent for me, it’s much more present in my head and in my everyday life. I try to make people …
Transformation in Technology and Cybersecurity by Sapann Harish Talwar
In today’s increasingly digital and hyperconnected world, transformation in technology and cybersecurity is no longer a choice. It has become a strategic imperative. Organizations across all industries are accelerating efforts to digitize their operations, modernize infrastructure, and adopt emerging technologies such as cloud computing, artificial …
AI Security Challenge
The landscape of AI security presents a unique challenges. Adversaries are increasingly sophisticated, aiming to manipulate AI models, exfiltrate sensitive data, or exploit vulnerabilities within AI systems for various malicious ends. On top they are using /consuming millions of feeds , so we are looking …
Not Just European, But Trustworthy: What DNS4EU Reminds Us About Sovereignty, Surveillance, and (Actual) Security
When Infrastructure Becomes Political Once upon a time, infrastructure was invisible. It quietly kept the world running – roads, pipes, power grids, protocols. You only noticed it when it broke. But digital infrastructure isn’t invisible anymore. It’s political. It’s strategic. And increasingly, it’s personal. In …
03:17 AM: When Everything Goes Wrong by Jonathan Wood
There is a very specific time of day when it all seems to fall apart. For Cyber Security, that time is around 03:17 AM. If you’re in security, you will recognise this feeling, the kind of sensation where you feel there is an elephant in …