Transformation in Technology and Cybersecurity by Sapann Harish Talwar

In today’s increasingly digital and hyperconnected world, transformation in technology and cybersecurity is no longer a choice. It has become a strategic imperative. Organizations across all industries are accelerating efforts to digitize their operations, modernize infrastructure, and adopt emerging technologies such as cloud computing, artificial 

AI Security Challenge 

AI Security Challenge 

The landscape of AI security presents a unique challenges. Adversaries are increasingly sophisticated, aiming to manipulate AI models, exfiltrate sensitive data, or exploit vulnerabilities within AI systems for various malicious ends. On top they are using /consuming millions of feeds , so we are looking 

Not Just European, But Trustworthy: What DNS4EU Reminds Us About Sovereignty, Surveillance, and (Actual) Security

Not Just European, But Trustworthy: What DNS4EU Reminds Us About Sovereignty, Surveillance, and (Actual) Security

When Infrastructure Becomes Political Once upon a time, infrastructure was invisible. It quietly kept the world running – roads, pipes, power grids, protocols. You only noticed it when it broke. But digital infrastructure isn’t invisible anymore. It’s political. It’s strategic. And increasingly, it’s personal. In 

03:17 AM: When Everything Goes Wrong by Jonathan Wood

03:17 AM: When Everything Goes Wrong by Jonathan Wood

There is a very specific time of day when it all seems to fall apart. For Cyber Security, that time is around 03:17 AM. If you’re in security, you will recognise this feeling, the kind of sensation where you feel there is an elephant in 

Too Big to Fail, Too Centralised to Survive: What 16 Billion Leaked Logins Tell Us About the Wrong Kind of Scale

Too Big to Fail, Too Centralised to Survive: What 16 Billion Leaked Logins Tell Us About the Wrong Kind of Scale

When 16 billion credentials turn up in a single breach compilation, it should shake us. But it doesn’t. Not anymore. And that’s the problem. In the latest reminder that password-based security is a brittle mess, security researchers revealed a mega-leak containing more than 16 billion 

“What happens to Heroes?” EPISODE #7: The Unsung Heroes of the digital world “

“What happens to Heroes?” EPISODE #7: The Unsung Heroes of the digital world “

The Psychological Impacts of Cyberattacks What I will call the “Heroes” Excerpts from Interviews with Heroes THINGS TO REMEMBER About the Author Didier Annet is an Operational & Data Resilience Specialist and a Certified Professional Coach dedicated to empowering individuals and teams to navigate the 

CyAN’s Position on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement

CyAN’s Position on the Recommendations of the High-Level Group on Access to Data for Effective Law Enforcement

CyAN opposes recommendations made by the European Commission’s High-Level Group on Access to Data for Effective Law Enforcement (HLG).

Hack the Planet? No. Just Hack the Tap: What exposed water systems tell us about the state of cybersecurity around the world

Hack the Planet? No. Just Hack the Tap: What exposed water systems tell us about the state of cybersecurity around the world

Final thought About the Author: Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions. She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.

Board Member Spotlight: Adj. Prof. Dr. Greg Dzsinich, LLM, CIPP/E

Board Member Spotlight: Adj. Prof. Dr. Greg Dzsinich, LLM, CIPP/E

One idea that continues to guide his leadership comes from his time at Microsoft. When he joined the company in 2008, he was struck by a powerful metaphor. If we sit in one boat, we must not only row well. We must also remain in 

“What happens to Heroes?” EPISODE #6: The Unsung Heroes of the digital world by Didier Annet

“What happens to Heroes?” EPISODE #6: The Unsung Heroes of the digital world by Didier Annet

The Psychological Impacts of Cyberattacks What I will call the “Heroes” Let’s Rewrite the Story of a Cyberattack – Alternate History of a winning scenario Excerpt From the Interview Typical identification factor: “Right reflexes, right roles — from click to crisis” About the Author Didier