Introduction In today’s interconnected world, the importance of digital rights cannot be overstated. While the European Union is making commendable strides in this arena, Australia stands at a pivotal juncture to assert its leadership in championing online freedom. The nation’s commitment to democratic values, coupled with a robust technological infrastructure, uniquely positions it to influence […]
Strategy
Cyber (In)Securities – Issue 123
Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the cryptocurrency’s potential to disrupt financial stability. This decision introduces a […]
Cyber (In)Securities – Issue 122
Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]
Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
Cyber (In)Securities – Issue 119
Information Security News Google Cloud Links Poor Credentials to Nearly Half of All Cloud-Based AttacksBy Matt Kapko, Cybersecurity DiveRead moreGoogle Cloud has reported that nearly half of all cloud-based cyberattacks can be traced back to weak or compromised credentials. Attackers frequently exploit poor password hygiene and misconfigured access controls to infiltrate cloud environments, leading to […]
Welcome New Member – Dale Connell from Trinidad!

Please welcome our newest member from Trinidad, Dale Connell! Dale Connell is a seasoned Cyber Risk and Technology Lead within Deloitte’s Consulting service line at the Trinidad and Tobago office. With extensive expertise in information security strategy and implementation, Dale supports organizations across various industries in developing and executing robust cybersecurity frameworks. His experience spans […]
Welcome new member – Fatema Fardan

Please welcome our newest CyAN member, Fatema Fardan, from Bahrain. Fatema Fardan is a passionate and experienced Cyber, Digital, and Information Security professional with over 16 years of expertise in the financial and banking industries. She has successfully managed and delivered enterprise-level projects, including Information Security Strategy Design, Security Process Framework and Policy Development aligned […]
Welcome New Member – William Rivera

Please welcome our newest CyAN member, Will Rivera, from the United States! Will Rivera is a seasoned leader with over 17 years of experience in advocacy and mission-driven organizations. As Managing Director at MyOwn Image, he drives nationwide efforts to combat technology-facilitated violence and promote intimate privacy, working at the intersection of digital safety and […]
Streamlining Operations: The Efficiency Gains from Cybersecurity
In the previous parts of our series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve looked at cybersecurity as a strategic business asset, the financial implications of cyber threats, and its crucial role in fostering customer trust. This fourth instalment examines another crucial aspect of cybersecurity—its ability to enhance operational efficiency. As we navigate our […]
Understanding the Cost of Cyber Threats

In an ever-evolving digital landscape, the rise of cyber threats has made cybersecurity a top priority for businesses worldwide. Historically, cybersecurity has been seen as a shield—a defensive mechanism to ward off attackers and protect our sensitive data. However, in this increasingly interconnected world, it’s high time we start recognising cybersecurity as more than just […]