Recent Posts

Article Publication – “Protecting Responsible Cybersecurity Vulnerability Research”

CyAN members John Salomon and Nick Kelly have just published an article in the European Cybersecurity Journal on the legal treatment of responsible cybersecurity vulnerability disclosure.

Please Stop Overva(i)luing Buzzwords

Please Stop Overva(i)luing Buzzwords

An informed rant about how excessive industry focus on currently trendy technologies and terminology harms competitiveness and readiness in the information security world.

Cybersecurity Reinforced: Elevating Patch, Vendor, and Asset Management for Robust Defence Mechanisms

Introduction In a world where cybersecurity threats are not a matter of ‘if’ but ‘when’, the resilience of an organization’s defence mechanisms is paramount. While instances like the Cisco zero-day vulnerability serve as a reminder of the pervasive threats, they also underscore the need for 

Strengthening Organisational Resilience: A Comprehensive Exploration of Cybersecurity Maturity Models

Introduction October, celebrated as Cybersecurity Awareness Month globally, is a critical juncture for organisations to reflect on the escalating cyber threats that relentlessly test our defences. As we navigate an intricate digital landscape, the adoption and implementation of diverse yet complementary cybersecurity maturity models and 

Navigating the 2023 Cyber Landscape: A Comprehensive Guide for the C-Suite

As we delve into the intricacies of Cybersecurity Awareness Month this year, the intricate dance between evolving digital landscapes and complex cybersecurity challenges becomes ever more apparent. For every organization, especially those at the CISO, C-suite, and boardroom levels, the magnifying lens on cybersecurity has 

Moving from awareness to establishing a cybersecurity culture : the under used potential of managers

Moving from awareness to establishing a cybersecurity culture : the under used potential of managers

CyAN member Delphine Chevallier discusses the need to do more to involve management closely in the development of cybersecurity maturity in organizations.

Stay Ahead of the Game: Outsmarting Scammers in 3 Simple Steps

Our friends at the Global Anti-Scam Alliance (GASA.org) provide a high level overview of current scam trends and techniques, and how to protect yourself.

The Imperative of Unified Cybersecurity in a Digitalised World

In our previous discussions, we delved into the multifaceted role of cybersecurity as a strategic business asset. We highlighted its pivotal role in safeguarding revenue, fortifying customer trust, and enhancing operational efficiency. In this discourse, we will dissect why unified cybersecurity has become more crucial 

Regulatory Compliance: Sidestepping Penalties through Robust Cybersecurity

In our ongoing series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve explored how cybersecurity acts as a strategic business asset, protects revenue, builds customer trust, and enhances operational efficiency. In this final instalment, we turn our attention to the role of cybersecurity in ensuring 

Streamlining Operations: The Efficiency Gains from Cybersecurity

In the previous parts of our series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve looked at cybersecurity as a strategic business asset, the financial implications of cyber threats, and its crucial role in fostering customer trust. This fourth instalment examines another crucial aspect of