Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Developing a framework to measure cyber resilience behaviour of indian bank employees
Cyber resiliency of an organization depends on the IT infrastructure and cyber security measures undertaken; however, a prominent factor to achieve resilience depends on the employees. Confronted with this bleak realization, it is only recently that the need for cyber...
Gamification of cybersecurity awareness – A systematic review of games
This thesis presents the state of the art of games used in cyber security awareness. In this regard, a systematic review of games following PRISMA guidelines was conducted on the relevant papers published between 2010 to 2021. The games were analyzed based on their...
Why Do You Need GitHub Backup?
DevOps.com
Supercharge security awareness training with this age-old technique
People have been using stories to pass on information for over 4,000 years. Integrating stories into security awareness training increases the chances of people remembering information, and relaying it to loved ones. We use story-style training at CybSafe. Below...
Plexal’s accelerator to boost number of diverse cyber firms
DiversityQ
The future human and behavioural challenges of cybersecurity
This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not...
CybSafe has been named in the Q4 2021 Now Tech report for Security Awareness and Training
The report highlights the innovation and disruption within the SA&T market, driven by customer expectation CybSafe, the behavioural security platform that helps enterprises manage people-related cyber risk with behavioural science and data analytics,...
This newly unveiled accelerator in the UK has roped in 108 cyber startups
UKTN
Cyber Runway
Professional Security Magazine Online
Security startups line up on Cyber Runway
Computer Weekly
What influences employees to follow security policies?
Incorporating the Value of Congruence Model (VC), the Theory of Planned Behavior Model (TPB), and Security-Conscious Care Behavior, this study demonstrates that cybersecurity behavior can be effectively influenced through straightforward and cost-efficient measures....
Human-centric cybersecurity research: From trapping the bad guys to helping the good ones
The issue of cybersecurity has surged in importance in recent years due to numerous high-profile incidents, hacking attempts, and data breaches that have captured headlines. The continuous rise in cyber incidents suggests the need for a reevaluation of how we perceive...
Jewellery firm Graff suffers ransomware attack, hackers begin leaking client details
Computing
Graff Jewellers’ Celebrity Clients Details Leaked By Cyberhackers
GlamSquad Magazine
Avoid being a victim of social engineering attack during the COVID-19 pandemic
This article delves into the impact of the COVID-19 pandemic on the proliferation of social technology attacks. It discusses the implications of these emerging threats and offers strategies for addressing them. By examining various known threats associated with...
Understanding factors that influence unintentional insider threat: A framework to counteract unintentional risks
The exploitation of individuals classified as insiders is widely acknowledged as a common avenue for cyberattacks. Recent research approaches this issue from various angles, covering aspects related to technology, psychology, and sociotechnical factors. This...
How Can Businesses Maintain IT Security in a Hybrid Working Model?
EM360
Britain’s Biggest Ever Celebration of Business Success
Business Leader
Tesco Website Back Up After Weekend Hack Attempt
Digit
Human factors in phishing attacks: A systematic literature review
Phishing, defined as the fraudulent endeavor to acquire sensitive information by impersonating a reputable entity in digital communication, remains a prevalent form of cyber attack. Its success is often attributed to users' lack of awareness of vulnerabilities or...
Shame in cyber security: Effective behavior modification tool or counterproductive foil?
Organizations often respond to cyber security breaches by blaming and shaming the employees who were involved. There is an intuitive natural justice to using such strategies in the belief that the need to avoid repeated shaming occurrences will encourage them to...