Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]
Strategy
Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
Cyber (In)Securities – Issue 119
Information Security News Google Cloud Links Poor Credentials to Nearly Half of All Cloud-Based AttacksBy Matt Kapko, Cybersecurity DiveRead moreGoogle Cloud has reported that nearly half of all cloud-based cyberattacks can be traced back to weak or compromised credentials. Attackers frequently exploit poor password hygiene and misconfigured access controls to infiltrate cloud environments, leading to […]
Welcome New Member – Dale Connell from Trinidad!

Please welcome our newest member from Trinidad, Dale Connell! Dale Connell is a seasoned Cyber Risk and Technology Lead within Deloitte’s Consulting service line at the Trinidad and Tobago office. With extensive expertise in information security strategy and implementation, Dale supports organizations across various industries in developing and executing robust cybersecurity frameworks. His experience spans […]
Welcome new member – Fatema Fardan

Please welcome our newest CyAN member, Fatema Fardan, from Bahrain. Fatema Fardan is a passionate and experienced Cyber, Digital, and Information Security professional with over 16 years of expertise in the financial and banking industries. She has successfully managed and delivered enterprise-level projects, including Information Security Strategy Design, Security Process Framework and Policy Development aligned […]
Welcome New Member – William Rivera

Please welcome our newest CyAN member, Will Rivera, from the United States! Will Rivera is a seasoned leader with over 17 years of experience in advocacy and mission-driven organizations. As Managing Director at MyOwn Image, he drives nationwide efforts to combat technology-facilitated violence and promote intimate privacy, working at the intersection of digital safety and […]
Streamlining Operations: The Efficiency Gains from Cybersecurity
In the previous parts of our series, “Cybersecurity: The Unsung Hero of Revenue Protection,” we’ve looked at cybersecurity as a strategic business asset, the financial implications of cyber threats, and its crucial role in fostering customer trust. This fourth instalment examines another crucial aspect of cybersecurity—its ability to enhance operational efficiency. As we navigate our […]
Understanding the Cost of Cyber Threats

In an ever-evolving digital landscape, the rise of cyber threats has made cybersecurity a top priority for businesses worldwide. Historically, cybersecurity has been seen as a shield—a defensive mechanism to ward off attackers and protect our sensitive data. However, in this increasingly interconnected world, it’s high time we start recognising cybersecurity as more than just […]
Cybersecurity: The Unsung Hero of Revenue Protection

Part 1: Reframing Cybersecurity: From Defence to Business Strategy In an ever-evolving digital landscape, the rise of cyber threats has made cybersecurity a top priority for businesses worldwide. Historically, cybersecurity has been seen as a shield—a defensive mechanism to ward off attackers and protect our sensitive data. However, in this increasingly interconnected world, it’s high […]
Interview with Jean-Christophe Le Toquin about Privacy Vs Security
“The problem is that if we really implement these technologies to the full extent, and they should be if you want to protect children from being abused in private communications, then there is no limit to the technology, and our homes will be turned into glass houses, and this is not something we want to […]