No Time for Antics with Semantics: Why CVEs Are Cybersecurity’s Lifeline

The cybersecurity world runs on shared language. We don’t often talk about it in those terms—but that’s exactly what the CVE (Common Vulnerabilities and Exposures) system is. A global taxonomy of flaws. A universal index of weakness. The quiet backbone that lets defenders coordinate responses in a coherent, time-sensitive, and standardised way. This week, we […]

What happens to Heroes?” EPISODE #4: The Unsung Heroes of the Digital World by Didier Annet

The Psychological Impacts of Cyberattacks This is the fourth episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes”! Let’s Rewrite the Story of a Cyberattack – Uchrony of a losing scenario “The […]

Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence […]

Strengthening Global Security: Data Protection as National Imperative

In my previous article, Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives, we explored the intricate balance between protecting national interests and promoting global digital cooperation. Building on that foundation, Part 2 of our series dives deeper into how nations can fortify their cybersecurity initiatives without hindering the international flow of […]

“What happens to Heroes ?” EPISODE #3: The short story long by Didier Annet

The Psychological Impacts of Cyberattacks This is the third episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” The hidden impact of Cyberattacks“Two or three days later, the paranoia sets in and […]