Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Cyber security and digital exclusion of seniors: What do they fear?
Seniors represent a group that, compared to other groups, lives in a digital exclusion to an excessive extent, mainly due to the fact that they lack the necessary knowledge to use digital technology and digital services. Based on empirical data collected from seniors...
Is it possible to change the cyber security behaviours of employees? Barriers and promoters
The increase in cyber attacks cause individuals and businesses to face financial loss and reputation damage. Most cyber security studies ignore human factor and focus only on technological measures although the cyber security behaviors of employees are vital for the...
Introduction to the Special section on artificial intelligence security: Adversarial attack and defense
Artificial intelligence (AI) has been widely adopted in various applications such as face detection, speech recognition, machine learning, etc. Due to the lack of theoretical explanation, recent works show that AI is vulnerable to adversarial attacks, especially deep...
What parts of usable security are most important to users?
This paper builds on previous work and investigates what usability factors users prioritize and what demographic factors that affects the perception of usability factors. This is done through a survey answered by 1452 respondents from Sweden, Italy and UK. The results...
Cyber insurance report declares ransomware a ‘digital pandemic’
Silicon Republic
Cyber insurance costs up by a third
Computer Weekly
Beyond Murphy’s law: Applying wider human factors behavioural science approaches in cyber security resilience
Practitioners’ experience and use of different assessment methods and approaches to establish cyber-security vulnerabilities and risk are evaluated. Qualitative and quantitative methods and data are used for different stages of investigations in order to derive risk...
Social engineering attacks: Recent advances and challenges
The world’s technological landscape is continuously evolving with new possibilities, yet also evolving in parallel with the emergence of new threats. Social engineering is of predominant concern for industries, governments and institutions due to the exploitation of...
Human characteristics and genomic factors as behavioural aspects for cyber security
This work aims to hypothesise a possible holistic architecture for specific human behaviour factors involved in cyber security risks. A good cyber security habit could prevent incidents and protect against attacks. Habits are mostly initiated automatically. Therefore,...
Digital human in cyber security risk assessment
The work aims to build a formal ontology-based model for cyber security risk assessment that considers digital human characteristics. A multi-layered architecture solution was build as a proof of concept to maintain a set of artificial intelligence algorithms and...
Understanding the last line of defense: Human response to cyber security events
Cybersecurity is an escalating concern in today's technology-driven world, spanning consumer, corporate, and military domains. A literature review focused on human responses to cybersecurity incidents reveals a three-phase process in cybersecurity response: 1....
A mixed methods approach to understanding cyber-security vulnerability in the baby boomer population
The ongoing development and ubiquitous spread of technology has brought with it new threats and opportunities for online victimisation. Although human factors cyber-security research continues to try to mitigate these threats through the application of behavioural...
The current state of research on people, culture and cyber security
What is becoming apparent is that we need a better understanding of the human aspects of cyber security not only in terms of its impacts on organisations, communities and individuals but also in terms of how human behaviour itself contributes to cyber security-related...
Salvation Army Hit by Ransomware Attack
InfoSecurity Magazine
Human factors in cyber security: A scoping review
In this work we carry out a scoping review to investigate the take of the computer science community on the human-centric cyber security paradigm by considering the top conferences on network and computer security for the past six years. Results show that broadly two...
How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens
The Capability-Opportunity-Motivation-Behavior (COM-B) model posits that individuals' behavior can be understood by considering their capabilities, opportunities, motivation, and the interplay among these factors. This research aims to apply the COM-B model to analyze...
Angelsey schools offline after cyber attack
Computer Weekly
The Internet of Things and cyber security: what are the risks?
In today's society, we are more interconnected than ever before. The devices we use are linked in unprecedented ways. A big factor behind this is the rise of the Internet of Things (IoT). It brings internet connectivity to a range of devices. From watches and phones...
[Healthcare & Pharmaceutical] NHS Bolton
Time is a premium for healthcare workers, now more than ever. So security awareness often takes a back seat. Discover how NHS Bolton use CybSafe to make the most of that narrow window of opportunity.
Entrepreneur Insight – Oz Alashe founder and CEO of CybSafe
New Business Magazine Online
Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publication
Human factor is widely recognized as the first threat to the security of information systems (ISS). ISS research thus points to the problem of user behavior, which is overwhelmingly represented as a fallibility that would be part of its nature. Companies would...