Imagine living in constant fear, knowing that every online interaction could be monitored, every move tracked and every personal detail exploited by an abusive partner. This is the harsh reality for millions of individuals worldwide who are victims of technology-facilitated abuse (TFA) and technology-facilitatedviolence (TFV). …
The Cybersecurity Advisors Network (CyAN) congratulates all the winning CISO’s for the Top 50 CSG Awards 2024 organized by Enterprise IT World MEA on April 24, 2024. The CSG Awards, which was held as part of the extended event of GISEC 2024, was an initiative …
📣 We are delighted to announce that we have become an Institutional Partner of the CYBERSEC CEE EXPO & FORUM, which will be held on 19-20 June in Cracow. We will be there to underline the role of connecting markets and entities in the field of cybersecurity.
🔴 Let’s meet ONSITE in @EXPO Kraków and let’s talk about fostering cybersecurity in the Central & Eastern European (CEE) region!
The 2ne edition of MaTecc, the conference on cybersecurity and data protection that aims to build trust in Morocco and Africa, took place on 22-25 April 2024. MaTeCC is co-organised by Ecole High Tech and Cybersecurity Advisors Network (CyAN). It featured over 30 experts over …
As cybersecurity professionals, we at the Cybersecurity Advisors Network (CyAN) are acutely aware of the critical role that technology plays in shaping our society. As our primary focus is on information security, data protection as well as Trust & Safety, we recognise the broader implications …
“The Internet runs on Linux” – over 90% of the top million websites run on Linux, and it’s a critical part of the global Internet, used for a huge range of applications – industrial & control systems (ICS), workstations, automotive computers, in-flight entertainment, core banking applications, printers, routers, and many more.
In this wide-ranging discussion we talk about challenges in securing Linux systems, as well as different types of Linux-specific threats and attacks. Linux-specific malware and threat actors are often far more sophisticated, targeted, and mutable than more commoditized Windows attacks, and understanding both the nature of such threats and the weaknesses they exploit are an important tool in helping to secure this often underappreciated and invisible but vital platform.
Full disclosure – John Salomon is a paid consultant to Sandfly Security. This is explicitly not intended to be a marketing video. Rather, Craig is a highly experienced and respected Linux malware engineer with a significant Twitter presence and a wide range of knowledge about attacks and countermeasures. Check out his Sandfly YouTube channel, which includes numerous videos on these topics.
Also available in audio-only podcast format on numerous platforms via https://cybersecurityadvisors.network/media
Cybersecurity Advisors Network (CyAN) is proud to be a part of the CSG Awards 2024, as Advisory Partner. Our strategic member in Middle East – Dubai, Bharat Raigangar, is part of the Jury committee to identify the Best Minds in The Cyber – AI domain. …
In the latest of our series of discussions on CyAN’s YouTube channel “State of (Cyber)War” playlist about cyber conflict and -capabilities, Hugo Tarrida and John Salomon talk about the background and current state of cyber conflict in the Middle East.
It’s been a while, but we’re pleased to finally bring you the latest episode in our State of (Cyber)War podcast series, part of CyAN’s Secure-in-Mind channel.
Hugo Tarrida and John Salomon take a crack at understanding China’s cyberwarfare capabilities – what are the country’s motivations? What philosophical approaches has the People’s Liberation Army taken towards cyberwarfare? Where are the lines between espionage and offensive operations, and where do Chinese cyberattacks fit into the picture? And perhaps most importantly, what biases should we be conscious of from a Western perspective?
AI is causing unprecedented changes that are both creating new opportunities and transforming individuals, businesses, and society. The current AI landscape is characterised by increased competition and dependence on a small number of dominant players. These players have the talent, resources, data, and a willing …