Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Behavior change: An intelligent approach for cybersecurity
Behavior Change An intelligent approach for cyber securityIn this whitepaper, we outline the CybSafe approach to applying behavioural science, how it’s embedded in everything we do and how our products drive behavior change in employees. Contents: About CybSafe...
How to identify and manage cybersecurity risks in your supply chain
Achilles
Some simulated attacks help reduce cyber risk. Others are redundant. What’s the difference?
Here’s an interesting conundrum for cyber security professionals. Some simulated attacks reduce human cyber risk. Others, however, have no effect on risk – and may even have a negative impact. Even more perplexing: an identical course of simulated...
Oz Alashe Appearing on BBC Business Live – Inside Track
Oz Alashe Appearing on BBC Business Live – Inside Track
A fifth of small businesses ‘have lost contracts’ after they were used to attack a customer
SC Magazine
Meet the top 10 fastest growing SaaS startups in Europe in 2019
Silicon Canals
Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?
Security Intelligence
The two most common phishing scams that affect UK businesses
Phishing scams evolve constantly. Don’t they? On the one hand, yes. Sophisticated cyber criminals are very much aware that, once a phishing scam becomes well known, its potency falls. So, over time, phishing scams adapt and evolve. On the other hand, the the nuts and...
Why it is difficult to stop targeted email attacks
IT World
Expert Panel: Can MFA work long term if customers prefer convenience over security?
ID Bulletin
What is spear phishing? Why targeted email attacks are so difficult to stop
CSO
Phishing versus spear phishing
CIO
CybSafe expands distribution footprint with SCOPE ME
Tahawultech
Collection #1 data breach sees 773 million email IDs, 21 million passwords visible in massive data dump
GDPR.Report
Cognitive processing of phishing emails
Phishing, the process of tricking people using emails and imitation of websites, has been studied from different points of views (computer sciences, engineering, economy, security and sociology) while the matter largely involves social cognition. This scoping review...
Remote Working Leading To More Data breaches
The Cloud Consultancy
Firms failing to train staff on remote working cyber security
HR Magazine
Remote working poses significant security risk to UK’s businesses
Digitalisation World
Research on countermeasures of strengthening information security education of college students
This paper aims to study the countermeasures of strengthening information security education of college students, improve college students' awareness of personal information protection, and effectively protect college students' personal information security. By means...
Investigating the impact of cyber security policy awareness on employees’ cyber security behavior
As internet technology and mobile applications increase in volume and complexity, malicious cyber-attacks are evolving, and as a result, society is facing greater security risks in cyberspace more than ever before. This study has extended the published literature on...
Towards a method for examining the effects of cognitive load on the performance of cyber first responders
In this study we investigated the behaviour and physiological responding of trainee cyber security workers while undertaking a Capture-the-Flag (CTF) task. Participants were equipped with armbands that recorded two measures of cognitive load, including; heat flux and...