New Podcast: Military Cryptology, Part I

New Podcast: Military Cryptology, Part I

Cryptography and Cryptanalysis – Military Applications From Antiquity to the End of World War II Join our motivated more-or-less informed amateurs Hugo Tarrida and John Salomon for the latest in our State of (Cyber)War series, part of CyAN’s Secure in Mind video and podcast network. 

The Cybersecurity Landscape in 2025: Top Predictions and Implications for Leaders

The Cybersecurity Landscape in 2025: Top Predictions and Implications for Leaders

🔒 The Cybersecurity Landscape in 2025: What Every Leader Needs to Know 🔒

As we step into 2025, the world of cybersecurity is more dynamic—and more critical—than ever before. The rapid evolution of technology brings both unprecedented opportunities and formidable challenges. Cybercriminals are getting smarter, state-sponsored threats are on the rise, and emerging technologies like quantum computing are reshaping the risk landscape.

In my latest LinkedIn blog, I dive into the top five cybersecurity predictions for 2025, exploring the trends that will shape our strategies, investments, and priorities in the coming year.

From the rise of AI-driven threats and state-sponsored cyber warfare to advancements in quantum-resilient cryptography and the adoption of Zero-Trust Architecture, this post takes a comprehensive look at what lies ahead. More importantly, I outline what these developments mean for leaders like you—across cybersecurity, business, and beyond.

This isn’t just about managing risks—it’s about preparing for the future, building resilience, and turning challenges into opportunities.

👉 Read the full blog below and join the conversation. Let’s shape the future of cybersecurity together!

#Cybersecurity #Leadership #Innovation #ZeroTrust #AI

Resilience or Regulation? Europe’s Digital Transformation at a Crossroads

Resilience or Regulation? Europe’s Digital Transformation at a Crossroads

As Europe introduces the NIS2 Directive and the Digital Operational Resilience Act (DORA), the continent faces a pivotal question: Are these regulatory frameworks merely a defensive response to rising cyber threats, or are they a foundation for a more resilient and innovative digital ecosystem? This article explores how these initiatives intertwine regulation with resilience, shaping Europe’s role in the global digital landscape.

New Podcast: China’s Cyber-Range Exercises

New Podcast: China’s Cyber-Range Exercises

Mei Danowski and Eugenio Benincasa join us for an in-depth discussion about Chinese cyber-range exercises, on our Secure-in-Mind video/podcast channel

16 Days of Activism – Against Gender-Based Violence

16 Days of Activism – Against Gender-Based Violence

CyAN member and VP Kim Chandler McDonald has published several articles under the “16 Days of Activism Against Gender-Based Violence” campaign.

Europe: Prepare for (Cyber) War…

Si Vis Pacem… A recent article published in the Frankfurter Allgemeine Zeitung (FAZ – soft paywall) about Germany’s “Operationsplan Deutschland” (English version of the informational brochure here), or OPLAN DEU, has drawn media attention to escalating tensions between the EU and aligned countries, and Russia, 

Offensive AI Against Disinformation

Offensive AI Against Disinformation

This 100% entirely dead-serious (pinky promise) article proposes the use of artificial intelligence as a scalable, economic, and effective counter to disinformation.  

Faking GitHub Commits – What Could Go Wrong?

Faking GitHub Commits – What Could Go Wrong?

Found: a tool creating dummy GitHub source code commits to help programmers game job evaluation mechanisms. This illustrates a deeper issue with how badly designed incentives can have serious security consequences.

Keep an Eye on the United Nations Cybercrime Convention

Keep an Eye on the United Nations Cybercrime Convention

The proposed United Nations Cybercrime Convention creates several provisions to enhance international cooperation in the fight against digital crime. Unfortunately, it also contains numerous flaws that could seriously undermine individual rights and privacy.

Subsea Cables Part II – Mind the Sharks

Subsea Cables Part II – Mind the Sharks

Join us for the second episode of our two-part discussion about subsea cable communications.