Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Cue utilization, phishing feature and phishing email detection
Cognitive processes are broadly considered to be of vital importance to understanding phishing email feature detection or misidentification. This research extends the current literature by introducing the concept of cue utilization as a unique predictor of phishing...
Simulation based learning in critical infrastructure security awareness: An empirical study
This thesis investigates how simulation-based learning affects the knowledge of cybersecurity risk management. To this end, an experiment was set up, leveraging the simulation game CyberCIEGE. Thirteen undergraduate IT students were involved in the experiment and took...
UN hacked: Attackers got in via SharePoint vulnerability
HelpNetSecurity
On demand webinar: Meaningful metrics
webinarAre you using meaningful metrics to manage human cyber risk?What will you learn during our webinar? Learn about how to measure success and progress in your campaigns Understand the importance of Awareness, Behaviour and Culture metrics Learn why shallow...
Phishing dominates UK cybercrime landscape
ITProPortal
The seven things you should be measuring to make sense of your cyber-security culture
TEISS
Phishing dominates UK cyber threat landscape
London Love Business
ICO reveals Phishing as top threat between 2017-2019
Comms Business
Phishing dominates UK cyber threat landscape, shows analysis of latest ICO figures
CybSafe analysed three years of cyber breach data from the ICO (2017 - 2019) Reports to the ICO in 2019 were up by 28% on 2018’s figures Phishing dominated the UK cyber threat landscape, accounting for 45% of reports to the ICO...
10 ways to get your people interested in cybersecurity
aGet your people interested in cyber security and you become more resilient. Here’s how to go about it, starting with the potential end of the world. Uranium centrifuges facilitate either nuclear power or nuclear weapons. They’re powerful, valuable and extremely...
Phishing dominates the UK threat landscape
BetaNews
Oz Alashe Appearing on TalkRadio – The Business Breakfast with James Max
The Business Breakfast with James Max. Thursday, January 9, 2020 (05:00 - 06:30) Listen to the full episode here.
What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices
The Internet of Things (IoT) is considered the next technological revolution. IoT devices include once everyday objects that are now internet connected, such as smart locks and smart fridges, but also new types of devices to include home assistants. However, while...
How to boost your team’s digital skills in 2020
SME Technology Guide
Cyber security behaviour of smartphone users in India: An empirical analysis
Many Indians have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using...
Human detection of attacks against cyber-physical systems
The main contributions from this work include: (1) A systematic study of how humans protect against, detect and respond to cyber attacks; (2) A detailed explanation of the devices that people use and their level of awareness of the sensors and components that these...
Enhancing the organisational culture related to cyber security during the university digital transformation
This article presents best practices of universities’ digitalisation from the cyber security and CRC point of view. ENISA’s CSC development guidance was used as the main tool for developing the general CSC programme for universities. The required changes of CSC and...
Cyber security @ home: The effect of home user perceptions of personal security performance on household IoT security intentions
This study explored potential human factors predictors of home user security intentions through the lens of past performance, perceived self-efficacy, and locus of control. While perceived self-efficacy and locus of control are elements in several organizational and...
Get yourself cybersecure for 2020
The Guardian
Password Breach of Game Developer Zynga Compromises 170 Million Accounts
CPO Magazine
Cybersecurity culture: The seven things businesses should be measuring
ITProPortal