Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Security startups line up on Cyber Runway
Computer Weekly
What influences employees to follow security policies?
Incorporating the Value of Congruence Model (VC), the Theory of Planned Behavior Model (TPB), and Security-Conscious Care Behavior, this study demonstrates that cybersecurity behavior can be effectively influenced through straightforward and cost-efficient measures....
Human-centric cybersecurity research: From trapping the bad guys to helping the good ones
The issue of cybersecurity has surged in importance in recent years due to numerous high-profile incidents, hacking attempts, and data breaches that have captured headlines. The continuous rise in cyber incidents suggests the need for a reevaluation of how we perceive...
Jewellery firm Graff suffers ransomware attack, hackers begin leaking client details
Computing
Graff Jewellers’ Celebrity Clients Details Leaked By Cyberhackers
GlamSquad Magazine
Avoid being a victim of social engineering attack during the COVID-19 pandemic
This article delves into the impact of the COVID-19 pandemic on the proliferation of social technology attacks. It discusses the implications of these emerging threats and offers strategies for addressing them. By examining various known threats associated with...
Understanding factors that influence unintentional insider threat: A framework to counteract unintentional risks
The exploitation of individuals classified as insiders is widely acknowledged as a common avenue for cyberattacks. Recent research approaches this issue from various angles, covering aspects related to technology, psychology, and sociotechnical factors. This...
How Can Businesses Maintain IT Security in a Hybrid Working Model?
EM360
Britain’s Biggest Ever Celebration of Business Success
Business Leader
Tesco Website Back Up After Weekend Hack Attempt
Digit
Human factors in phishing attacks: A systematic literature review
Phishing, defined as the fraudulent endeavor to acquire sensitive information by impersonating a reputable entity in digital communication, remains a prevalent form of cyber attack. Its success is often attributed to users' lack of awareness of vulnerabilities or...
Shame in cyber security: Effective behavior modification tool or counterproductive foil?
Organizations often respond to cyber security breaches by blaming and shaming the employees who were involved. There is an intuitive natural justice to using such strategies in the belief that the need to avoid repeated shaming occurrences will encourage them to...
Finalists announced for Security Excellence Awards 2021
Computing
Positive Security: Inspiring Behavioral Change at Workplace
Info Risk Today Asia
Cybersecurity Awareness Month: Employees are ready to ‘do their part’, but hampered by lack of education
Vigilance Security Magazine
Sunderland Uni faces continued disruption from cyber attack
FE News
Judging set to get underway for Go:Tech Awards .22
Business Leader
How do older adults feel about engaging with cybersecurity?
In the field of cybersecurity, older adults have become increasingly susceptible to cyberattacks. Despite this, there has been limited research into how older adults perceive and engage with protective cybersecurity behaviors. To address this gap, a novel card-sorting...
Changing the Black History Month narrative for a better company culture
HR Zone
STUDY: Millennials and Gen Z Say They are Bigger Victims of Cybercrime
The Learning Counsel
Public’s Knowledge of Cybersecurity Best Practices Sorely Lacking
Security Boulevard