The cybersecurity world runs on shared language. We don’t often talk about it in those terms—but that’s exactly what the CVE (Common Vulnerabilities and Exposures) system is. A global taxonomy of flaws. A universal index of weakness. The quiet backbone that lets defenders coordinate responses in a coherent, time-sensitive, and standardised way. This week, we […]
The CyAN Blog
Cybersecurity Advisors Network’s blog is a forum for CyAN members and friends to present their work and analysis to the broader information security community.
What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the fourth episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes”! Let’s Rewrite the Story of a Cyberattack – Uchrony of a losing scenario “The […]
La Liga: Blocking of Cloudflare IPs in Spain

Blocking of Cloudflare IPs in Spain due to claimed losses from piracy is a highly worrisome and excessive measure.
Behind the Keys: Women Who Secure the Future – Fatema Fardan

Download Feature PDF Want to connect? Here is Fatema Fardan’s professional profile. Feel free to say hello and show your support.
Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Behind the Keys: Women Who Secure the Future – Edna Conway

Download Feature PDF Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support.
Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence […]
Behind the Keys: Women Who Secure the Future – Roxanne Pashaei

Download Feature PDF Want to connect? Here is Roxanne Pashaei’s professional profile. Feel free to say hello and show your support.
Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
Strengthening Global Security: Data Protection as National Imperative

In my previous article, Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives, we explored the intricate balance between protecting national interests and promoting global digital cooperation. Building on that foundation, Part 2 of our series dives deeper into how nations can fortify their cybersecurity initiatives without hindering the international flow of […]
Behind the Keys: Women Who Secure the Future – Inssata RICOURT

Download Feature PDF Want to connect? Here is Inssata RICOURT’s professional profile. Feel free to say hello and show your support.
Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network (CyAN) She is a highly credentialed professional holding CISM, CEH, […]
“What happens to Heroes ?” EPISODE #3: The short story long by Didier Annet

The Psychological Impacts of Cyberattacks This is the third episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” The hidden impact of Cyberattacks“Two or three days later, the paranoia sets in and […]