Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Cyber influence of human behavior: Personal and national security, privacy, and fraud awareness to prevent harm
The Internet and connected technology platforms have enabled an increase of cyber influence activity. These actions target a range of personal to national level security and privacy attributes related to cybercrime, behavior, and identities. These emerging threats...
Love playing Draw Something or Words With Friends? Change your password now
TechRadar Pro
MILLIONS OF BRITS USING WEAK AND ‘EXPOSED’ PASSWORDS FOR ONLINE ACCOUNTS, NEW ANALYSIS SHOWS
Data Protection Magazine
6 ways to keep your business premises secure this Christmas?
Talk Business
#Privacy: Studies show UK consumers vulnerable due to weak passwording
GDPR:Report
Why do some organizations use two lms security awareness training solutions at once?
Why do some organizations often use two or more security awareness training solutions at once? That’s a question that grabbed our attention when it popped up on social recently. The comment highlighted the following cyber security oddity… Increasing numbers of...
The effects of the property of access possibilities and cyber security awareness on social media application
Cybersecurity became the third war in the world as it affects the privacy, security, availability, and access possibilities of user’s data. Lately, the statistics shows that the users prefer social media application to share their data and updates. Many users believe...
Millions of Brits using weak and ‘exposed’ passwords
Fudzilla
Exposed and weak passwords rife, warns CybSafe
Comms Dealer
Weak passwords leave UK businesses at risk of cyberattack
BetaNews
Almost three quarters of UK businesses employing staff with vulnerable passwords, CybSafe analysis reveals
IT Supply Chain
The Past, Present and Future of Cyber Security
Tech Nation
Internet of things & cyber security readiness in smart-government and organizations
We have studied the cybersecurity readiness for organizations in Kuwait to get a more information about how to build the cybersecurity readiness model. Cybersecurity readiness model is conceived from investigating the relationship among employee expertise, awareness,...
Improving employees’ intellectual capacity for cyber security through evidence-based malware training
This paper reports an in-depth investigation on how different evidence-based cybersecurity training methods impact employees’ perceptions of susceptibility, severity, self-efficacy, security intention as well as on their self-reported cybersecurity behaviors.
“Having the data and metrics available has allowed us to confidently make informed decisions and get tangible results regarding employee vigilance. We can now focus on the right areas and track our progress whilst doing so.”
Having the data and metrics available has allowed us to confidently make informed decisions and get tangible results regarding employee vigilance. We can now focus on the right areas and track our progress whilst doing so. Alexandre Pieyre, Group Information Security...
Almost three quarters of UK businesses employing staff with vulnerable passwords, CybSafe analysis reveals
Brits with weak and compromised passwords putting businesses at serious risk Canary Wharf, London, 21st November 2019 - Millions of Britons and hundreds of thousands of UK businesses are using cracked or weak passwords for online accounts, according to new research...
Announcing the winners of the Security Excellence Awards 2019
Computing
Developing Cyber Resilience
Future Talent - Changeboard
Ex-military tech entrepreneurs share their business advice
AWS Blog
Theoretical Domain Framework to Identify Cyber security Behaviour Constructs
In order to correct cybersecurity behaviour, it is important to understand both the behaviour as well as the cause of the behaviour. In an effort towards the latter, researchers have conducted empirical studies that investigate the constructs of cybersecurity...
The privacy paradox in the big data era? No thanks, we are the e-people: The e-people in the big data era
The objective of this work is to propose a new perspective in understanding the phenomenon of online behaviors, termed the privacy paradox, i.e., worry on preserving personal data and contents, but a little attention to disclose them, and thus introducing the new...