Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
We need human solutions to address human cyber risk
Lance Spitzner: Human risk calls for human solutions In this episode of the Behave podcast, CybSafe Founder & CEO Oz Alashe is joined by Lance Spitzner, Director at SANS Security Awareness.EPISODE 1Human risk calls for human solutionsThey talk about why we should...
The GenAI story isn’t just about technology. Here’s what’s at the heart of it.
Artificial intelligence. It’s everyone’s favorite dinner party topic, sure. But what’s actually going on out there? Who’s actually using it? What are they doing with it? What do they think about it—and about the companies that design it? Ultimately, what does all of...
FREE WEBINAR 30/10/2024: Applying the “Oh, Behave!” findings to SA&T programs
FREE WEBINARApplying the “Oh, Behave!” findings to SA&T programsTurning behavioral insights into organizational impact15:00 GMT • 11:00 ESTA strong security posture starts with a well-equipped workforce. But you can't help your people to be safer without...
Gartner® 5 Communications Tactics to Get People to Take Cyber Risk More Seriously
Gartner® 5 Communications Tactics to Get People to Take Cyber Risk More SeriouslyCybSafe is proud to bring you cutting-edge research in cybersecurity. We’re sharing what we believe is an unmissable resource, Gartner® 5 Communications Tactics to Get People to Take...
The frustration factor: Cybersecurity fatigue is shaping behavior…and not in a good way
In cybersecurity there are certain topics everyone will talk about until the cows come home (looking at you, GenAI)... and then there are those elephants in the room. Those big, pervasive issues that *somehow* go under-discussed, if they come up at all. It’s time to...
How to unlock CAM’s huge potential for behavior change
Cybersecurity Awareness Month is here. It’s the once-in-a-year opportunity where the spotlight shines bright on security. I wanted to take the opportunity to highlight some of the things CybSafe are doing to support organizations with their CAM initiatives, and call...
STUDY: Almost 40% of workers share sensitive information with AI tools, without employer’s knowledge
38% of workers share sensitive work information with AI without their employer’s knowledge More than half of employed participants have yet to receive any training on safe AI use 35% of participants included personal information in their passwords Boston and...
Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024-2025
OH, BEHAVE! 2024-2025The Annual Cybersecurity Attitudes and Behaviors ReportWe surveyed over 7000 people to reveal how behaviors and attitudes shape security risk. Top takeaways53% of participants are always connected online. 38% share sensitive work information with...
CybSafe a leader in Forrester Wave™ Human Risk Management Solutions, Q3 2024
Forrester’s mic-drop HRM report: Unpacking what it all means for you Okay, okay, we know what you're thinking. Another report? Really? We get it. 2024 is a big year for big reports. Like the one in which analyst firm Forrester declared Human risk management...
2024 Gartner®, The Security and Risk Management Leader’s Guide to the SEC Disclosure Rules
Gartner® The Security and Risk Management Leader’s Guide to the SEC Disclosure RulesCybSafe is proud to bring you cutting-edge research in cybersecurity. We’re sharing an exceptionally valuable report, Gartner® The Security and Risk Management Leader’s Guide to the...
FREE WEBINAR 04/09/2024: How to talk like a human risk manager
FREE WEBINARHow to talk like a human risk managerLanguage matters: Using risk terminology to build personal credibility15:00 BST • 10:00 EDTAre you a security awareness professional, or in the business of managing human risk? If so, understanding the relational...
7 cybersecurity lessons from the 1950s
Expert's 7 1950s-inspired principles for cyber resilience Moving beyond train-the-user and buy-this-tech Today’s cybersecurity could be rescued by ideas from 75 years ago. Yes, really. That’s the view of Danny Dresner, Professor of Cyber Security at the University of...
Interlinking GenAI and Human Cyber Risk
Generative artificial intelligence Generative artificial intelligence, or GenAI, is the term used to describe data-led algorithms (such as ChatGPT) that can be used to create new content, including audio, code, images, text, simulations, and videos. Recent accelerated...
Experts speak out: Four reasons your cyber risk strategy needs a reboot
Blind spots and biases: Experts get real at IMPACT 2024 USA Even seasoned practitioners mess up sometimes. We all do. And when we do, we make our own lives harder, sure. But who else is affected? The people we’re supposed to be helping. It’s not your fault. Security...
2024 Gartner®, How to Make Your Cybersecurity Program More Defensible to Stakeholders
Gartner®, How to Make Your Cybersecurity Program More Defensible to StakeholdersCybSafe is proud to bring you cutting-edge research in cybersecurity. We’re highlighting a valuable report, Gartner®, How to Make Your Cybersecurity Program More Defensible to...
On demand webinar: Maximizing user engagement during Cybersecurity Awareness Month
ON DEMAND WEBINARMaximizing user engagement during Cybersecurity Awareness MonthTips, tricks, and experiences from the pros15:00 BST • 10:00 EDTRecent research has shown users in organizations that participate in Cybersecurity Awareness Month are significantly more...
Training derailed? Experts on the future of security awareness
“Don’t tell me not to click when clicking is my job!”: Saving people from security awareness training We’re born knowing very little, yet we need a lot of knowledge to live our lives. Learning is, therefore, a huge part of being human…and it’ll never not be a part of...
Cybersecurity Awareness Month needs a human touch, with only 42% satisfied with current training
Most Cybersecurity Awareness Month (CAM) activities are promoted and carried out individually online, with only 26% discussing upcoming events in meetings, and a newsletter being the most popular CAM activity (62%). Activities are mandatory in just 37% of the...
The hidden cost of cybersecurity’s “masculinity problem”
Is cybersecurity steeped in masculinity? (Spoiler: Yes. And it’s a bigger problem than we all realized.) Cybersecurity. On the face of things, it’s hardly the pinnacle of traditional masculinity. But it’s a man’s world. It’s undeniably. Overwhelmingly. Male. It’s a...
Security Awareness Engagement Toolkit
Security Awareness Engagement Toolkit Our Security Awareness Engagement Toolkit—revamped for Cybersecurity Awareness Month 2024 (CAM2024)—has everything needed to create a security awareness program to improve people’s security behaviors. Cybersecurity Awareness...
Demystifying the EU AI Act
The EU AI Act, also known as the Artificial Intelligence Act, is the world’s first comprehensive piece of legislation directly governing artificial intelligence (AI). It comes into effect in 2025 and brings with it strict requirements. Its objective is to ensure the...
The Impact of Workload on Phishing Susceptibility: An Experiment
Phishing is when social engineering is used to deceive a person into sharing sensitive information or downloading malware. Research on phishing susceptibility has focused on personality traits, demographics, and design factors related to the presentation of phishing....