Recent Posts

Welcome New Member – Amna Almadhoob from Bahrain

Welcome New Member – Amna Almadhoob from Bahrain

Please welcome our newest member from Bahrain, Amna Almadhoob As a leader in the cybersecurity field, specializing in the financial industry, Amna brings extensive experience in defining strategic direction to secure operations, assets, and products against evolving threats. She has a proven track record in 

The Human Factor in OT Security Incidents: Understanding Insider Threats and Social Engineering in Critical Infrastructure by Rupesh Shirke

The Human Factor in OT Security Incidents: Understanding Insider Threats and Social Engineering in Critical Infrastructure by Rupesh Shirke

Introduction The human factor is an essential but overlooked security component in Operational Technology (OT) systems within critical infrastructure. However, although many technological defenses have improved, insider threats and social engineering remain serious due to inherent human activity and organizational culture vulnerabilities. Operators of OT 

Used, Not Consulted: When AI Trains on Our Work Without Consent

Used, Not Consulted: When AI Trains on Our Work Without Consent

CyAN Context At CyAN, we often talk about trust, governance, and transparency aspillars of a secure digital future. But what happens when thoseprinciples are ignored, not in a breach or a ransomware attack, but inthe slow, quiet erosion of creator rights? As a cybersecurity professional 

Week 20 – Critical elevation of privilege vulnerability in Azure DevOps

12 – 18 May 2025 A critical elevation of privilege vulnerability has been found in Azure DevOps, published on May 8, 2025, and updated with more details 2 days later on May 10, 2025. It has a CVSS score of 10.0! It’s not often that 

New Podcast – Let’s Talk Terrorism, With Bjørn Ihler

New Podcast – Let’s Talk Terrorism, With Bjørn Ihler

Bjørn Ihler joins us on the latest installment of our Secure-in-Mind series to share his experience and insights around terrorism, both online and offline.

Special Feature – 10th Anniversary

Special Feature – 10th Anniversary

Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at 

Welcome New Member –  Samira Marquaille from France

Welcome New Member – Samira Marquaille from France

Please welcome our newest member from France, Samira Marquaille Samira Marquaille is an IT Project Manager with more than 20 years of experience across both public and private sectors, with a strong focus on data privacy. She is skilled at uniting teams and fostering collaboration 

Welcome New Member – Andrew Pedroso from Australia

Welcome New Member – Andrew Pedroso from Australia

Please welcome our newest member from the Australia, Andrew Pedroso Andrew Pedroso has committed over a decade to business technology research, advisory, data, and consulting. Now, he has returned to his passion for cybersecurity and zero trust strategy. With deep expertise across key industries including BFSI, 

Welcome Back – Michael McDonald from Australia

Welcome Back – Michael McDonald from Australia

CyAN is thrilled to welcome back Michael McDonald, an internationally respected Senior Solution Architect, startup CTO, and technical visionary whose career spans three decades, five continents, and some of the most complex, high-stakes environments in industry and government. Michael brings rare breadth and depth across