Tag: CyAN

Used, Not Consulted: When AI Trains on Our Work Without Consent

Used, Not Consulted: When AI Trains on Our Work Without Consent

CyAN Context At CyAN, we often talk about trust, governance, and transparency aspillars of a secure digital future. But what happens when thoseprinciples are ignored, not in a breach or a ransomware attack, but inthe slow, quiet erosion of creator rights? As a cybersecurity professional 

Special Feature – 10th Anniversary

Special Feature – 10th Anniversary

Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at 

Welcome New Member –  Samira Marquaille from France

Welcome New Member – Samira Marquaille from France

Please welcome our newest member from France, Samira Marquaille Samira Marquaille is an IT Project Manager with more than 20 years of experience across both public and private sectors, with a strong focus on data privacy. She is skilled at uniting teams and fostering collaboration 

Behind the Keys: Women Who Secure the Future – Edna Conway

Behind the Keys: Women Who Secure the Future – Edna Conway

📄 Download Feature PDF Want to connect? Here is Edna Conway’s professional profile. Feel free to say hello and show your support. 🔗 Connect on LinkedIn About the Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at Bupa APAC Director at the Cybersecurity Advisors Network 

Behind The Keys: Women Who Secure the Future

Behind The Keys: Women Who Secure the Future

(In)Securities Special Edition (In)Securities Special Edition Celebrating International Women in Tech Day Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance 

Strengthening Global Security: Data Protection as National Imperative

Strengthening Global Security: Data Protection as National Imperative

In my previous article, Unraveling Digital Sovereignty: The Delicate Balance of Digital Sovereignty: Insights and Imperatives, we explored the intricate balance between protecting national interests and promoting global digital cooperation. Building on that foundation, Part 2 of our series dives deeper into how nations can 

Cyber (In)Securities – Issue 135

Cyber (In)Securities – Issue 135

Information Security News US Weakens Disinformation Defenses, as Russia & China Ramp Up Dark Reading by Robert LemosAs geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts 

Cyber (In)Securities – Issue 134

Cyber (In)Securities – Issue 134

Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns 

“What happens to Heroes ?” EPISODE #2: The Unsung Heroes of the digital world by Didier Annet

“What happens to Heroes ?” EPISODE #2: The Unsung Heroes of the digital world by Didier Annet

The Psychological Impacts of Cyberattacks This is the second episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack. What I will call the “Heroes” Which role within a