Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
On demand webinar: Hybrid working
WEBINAR Hybrid working is not an excuse for more crap e-learning The workplace has changed. What can the financial services industry do to better manage compliance and human-cyber risk? In 2020 the world changed. Working changed. Mental, social, physical, and...
Phishing in organizations: findings from a large-scale and long-term study
In this paper, we present findings from a large-scale and long-term phishing experiment that we conducted in collaboration with a partner company. Our experiment ran for 15 months during which time more than 14,000 study participants (employees of the company)...
Why the average person’s cyber security knowledge should worry you
You didn’t remember! You arrive at school and realise you have an exam you’ve forgotten about. You haven’t attended any of the classes, completed the reading, and definitely didn’t prepare. Sound familiar? This is the recurring “final exam” dream. It’s one of those...
The rise of ransomware: How to tackle ransomware by managing human risk
The rise of ransomware: How to tackle ransomware by managing human risk Ransomware is on the rise. What can be done about it?Reports of ransomware attacks have surged in recent years. Especially since remote work has become the norm. Because of this, more and more...
Developing a framework to measure cyber resilience behaviour of indian bank employees
Cyber resiliency of an organization depends on the IT infrastructure and cyber security measures undertaken; however, a prominent factor to achieve resilience depends on the employees. Confronted with this bleak realization, it is only recently that the need for cyber...
Gamification of cybersecurity awareness – A systematic review of games
This thesis presents the state of the art of games used in cyber security awareness. In this regard, a systematic review of games following PRISMA guidelines was conducted on the relevant papers published between 2010 to 2021. The games were analyzed based on their...
Why Do You Need GitHub Backup?
DevOps.com
Supercharge security awareness training with this age-old technique
People have been using stories to pass on information for over 4,000 years. Integrating stories into security awareness training increases the chances of people remembering information, and relaying it to loved ones. We use story-style training at CybSafe. Below...
Plexal’s accelerator to boost number of diverse cyber firms
DiversityQ
The future human and behavioural challenges of cybersecurity
This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not...
CybSafe has been named in the Q4 2021 Now Tech report for Security Awareness and Training
The report highlights the innovation and disruption within the SA&T market, driven by customer expectation CybSafe, the behavioural security platform that helps enterprises manage people-related cyber risk with behavioural science and data analytics,...
This newly unveiled accelerator in the UK has roped in 108 cyber startups
UKTN
Cyber Runway
Professional Security Magazine Online
Security startups line up on Cyber Runway
Computer Weekly
What influences employees to follow security policies?
Incorporating the Value of Congruence Model (VC), the Theory of Planned Behavior Model (TPB), and Security-Conscious Care Behavior, this study demonstrates that cybersecurity behavior can be effectively influenced through straightforward and cost-efficient measures....
Human-centric cybersecurity research: From trapping the bad guys to helping the good ones
The issue of cybersecurity has surged in importance in recent years due to numerous high-profile incidents, hacking attempts, and data breaches that have captured headlines. The continuous rise in cyber incidents suggests the need for a reevaluation of how we perceive...
Jewellery firm Graff suffers ransomware attack, hackers begin leaking client details
Computing
Graff Jewellers’ Celebrity Clients Details Leaked By Cyberhackers
GlamSquad Magazine
Avoid being a victim of social engineering attack during the COVID-19 pandemic
This article delves into the impact of the COVID-19 pandemic on the proliferation of social technology attacks. It discusses the implications of these emerging threats and offers strategies for addressing them. By examining various known threats associated with...
Understanding factors that influence unintentional insider threat: A framework to counteract unintentional risks
The exploitation of individuals classified as insiders is widely acknowledged as a common avenue for cyberattacks. Recent research approaches this issue from various angles, covering aspects related to technology, psychology, and sociotechnical factors. This...
How Can Businesses Maintain IT Security in a Hybrid Working Model?
EM360