Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Evaluating passwords, user behavior and the psychology of password management
Regardless of how complex an association's security framework is, it stays helpless because of the human factor. Content based passwords are usually utilized for verification in figuring condition. Despite the fact that passwords are considered as the underlying line...
5 essential cybersecurity best practices to follow as a remote employee
Forbes
Millions of Facebook users hit by passwords storage error
GDPR.Report
Cyber victim
PC Pro
Celebrate! SC Awards Europe 2019 shortlist announced today
SC Magazine
Facebook security policy and practices unfit, say infosec pros
Computer Weekly
This week’s London’s appointments
BDaily
Channel roundup: Who’s gone where?
Microscope
CybSafe appoints Mark Edge as Chief Revenue Officer
Prolific London
CybSafe appoints Mark Edge as Chief Revenue Officer to Fuel Further Growth
AiThority
CybSafe appoints CRO ahead of channel building campaign
Comms Dealer
CybSafe hires new channel head
IT Europa
Treasury cybersecurity: Dealing with the growing threat [part 2]
Global Treasurer
Behavior change: An intelligent approach for cybersecurity
Behavior Change An intelligent approach for cyber securityIn this whitepaper, we outline the CybSafe approach to applying behavioural science, how it’s embedded in everything we do and how our products drive behavior change in employees. Contents: About CybSafe...
How to identify and manage cybersecurity risks in your supply chain
Achilles
Some simulated attacks help reduce cyber risk. Others are redundant. What’s the difference?
Here’s an interesting conundrum for cyber security professionals. Some simulated attacks reduce human cyber risk. Others, however, have no effect on risk – and may even have a negative impact. Even more perplexing: an identical course of simulated...
Oz Alashe Appearing on BBC Business Live – Inside Track
Oz Alashe Appearing on BBC Business Live – Inside Track
A fifth of small businesses ‘have lost contracts’ after they were used to attack a customer
SC Magazine
Meet the top 10 fastest growing SaaS startups in Europe in 2019
Silicon Canals
Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?
Security Intelligence
The two most common phishing scams that affect UK businesses
Phishing scams evolve constantly. Don’t they? On the one hand, yes. Sophisticated cyber criminals are very much aware that, once a phishing scam becomes well known, its potency falls. So, over time, phishing scams adapt and evolve. On the other hand, the the nuts and...