Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Exposed and weak passwords rife, warns CybSafe
Comms Dealer
Weak passwords leave UK businesses at risk of cyberattack
BetaNews
Almost three quarters of UK businesses employing staff with vulnerable passwords, CybSafe analysis reveals
IT Supply Chain
The Past, Present and Future of Cyber Security
Tech Nation
Internet of things & cyber security readiness in smart-government and organizations
We have studied the cybersecurity readiness for organizations in Kuwait to get a more information about how to build the cybersecurity readiness model. Cybersecurity readiness model is conceived from investigating the relationship among employee expertise, awareness,...
Improving employees’ intellectual capacity for cyber security through evidence-based malware training
This paper reports an in-depth investigation on how different evidence-based cybersecurity training methods impact employees’ perceptions of susceptibility, severity, self-efficacy, security intention as well as on their self-reported cybersecurity behaviors.
“Having the data and metrics available has allowed us to confidently make informed decisions and get tangible results regarding employee vigilance. We can now focus on the right areas and track our progress whilst doing so.”
Having the data and metrics available has allowed us to confidently make informed decisions and get tangible results regarding employee vigilance. We can now focus on the right areas and track our progress whilst doing so. Alexandre Pieyre, Group Information Security...
Almost three quarters of UK businesses employing staff with vulnerable passwords, CybSafe analysis reveals
Brits with weak and compromised passwords putting businesses at serious risk Canary Wharf, London, 21st November 2019 - Millions of Britons and hundreds of thousands of UK businesses are using cracked or weak passwords for online accounts, according to new research...
Announcing the winners of the Security Excellence Awards 2019
Computing
Developing Cyber Resilience
Future Talent - Changeboard
Ex-military tech entrepreneurs share their business advice
AWS Blog
Theoretical Domain Framework to Identify Cyber security Behaviour Constructs
In order to correct cybersecurity behaviour, it is important to understand both the behaviour as well as the cause of the behaviour. In an effort towards the latter, researchers have conducted empirical studies that investigate the constructs of cybersecurity...
The privacy paradox in the big data era? No thanks, we are the e-people: The e-people in the big data era
The objective of this work is to propose a new perspective in understanding the phenomenon of online behaviors, termed the privacy paradox, i.e., worry on preserving personal data and contents, but a little attention to disclose them, and thus introducing the new...
Cognitive biases, dark patterns, and the ‘privacy paradox’
Scholars and commentators often argue that individuals do not care about their privacy, and that users routinely trade privacy for convenience. This ignores the cognitive biases and design tactics platforms use to manipulate users into disclosing information. This...
CybSafe invites cyber security professionals to contribute to new academic research into the impact of simulated phishing
London, 14th November: Today, the intelligent cyber security awareness and data analytics platform, CybSafe, announced that it is working on new research into the implementation and impact of simulated phishing. While simulated phishing campaigns are increasingly...
Research into simulated phishing
Digitalisation World
Ex-forces entrepreneurs: How veterans can start and grow businesses
StartUps.co.uk
Breaching the contract? Using social contract theory to explain individuals’ online behavior to safeguard privacy
This study applies social contract theory to examine whether perceptions of a social contract explains adaptive behavior to safeguard online privacy. We (1) identify and (2) estimate the prevalence of subgroups that differ in their perceived “social contract” (based...
Measuring the impact of intrinsic motivation on information security policy compliance
Most often, security breaches are related to internal employees due to their indirect or direct actions leading to information security policy (ISP) violations. Therefore, understanding employees’ intrinsic motivation and security behaviour towards ISP compliance is...
Moving from a ‘human-as-problem” to a ‘human-as-solution” cyber security mindset
The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change. Benefiting from research in other fields, we...
How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips
Forbes