Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Shortlist announced for UK IT Industry Awards 2019
Computing
Enterprises are increasing security demands on their suppliers
Digitalisation World
CyberTalks video – Awareness Behaviour Culture: The Human Aspects
Our people can make a difference. Oz Alashe MBE, CEO & Founder CybSafe talks to Karla Reffold about the human aspects of cyber security – Awareness Behaviour and Culture. He explains that we now have 37 years research into what it takes to change behaviour and we...
Security demands on SMEs are proving a barrier to success
IT Pro Portal
Fake Britain
BBC One
SMEs need to improve cyber security and cyber fraud credentials
Channel Eye
CybSafe finds enterprises are increasing security demands on their suppliers
IT Supply Chain
SMEs forced to meet cybersecurity demands in order to win contracts
BetaNews
AI-led cyber security training: the key to mitigating the human error threat
Information Age
CybSafe reaps the benefits of turning to the channel
MicroScope
Phishing attacks: Preying on human psychology to beat the system and developing cyber security protections to reduce the risks
The evolution of technology over the years has allowed people to more easily store, access, and share information on the Internet. People can bank online, shop, and post their latest life news. Unfortunately, all this available information has attracted the attention...
Student nurse attitudes and behaviours when using social network sites
The purpose of this study is to describe the effect of education in professional boundaries on the use and management of social media by using quantitative survey methods to ask "What are the social networking behaviours of student nurses following education in...
Thriving cyber security professionals: Building a resilient workforce and psychological safety in the federal government
Cybersecurity professionals in the federal government work on complex problems in organizations where they have multiple competing roles. In addition, the gap between workers with cyber skills and job openings means that current cybersecurity professionals must carry...
Review of reinforcement learning techniques
This study leverages reinforcement learning techniques to identify optimal strategies for cyber defense. These techniques are applied within a cybersecurity game framework, resulting in a continuous, adversarial decision-making scenario between two agents - an...
Tech Nation’s cyber security cohort: CybSafe’s company profile
Information Age
Exploring how personality affects privacy control behavior on social networking sites
Few studies have examined the relationship between personality traits and social networking sites (SNSs) with a dominant concentration on the personality alterations under SNSs influence. The relationship between personality and privacy control was less focused and...
Marriott Faces Massive $123 Million GDPR Fine For 2018 Security Breach
CPO Magazine
Heropreneurs Awards 2019 shortlist is announced!
Heroproneurs
CybSafe find two-third of enterprise suppliers quizzed about their cyber security training
Logistics Voices
Channel facing tough security demands from enterprises
Channel Eye
Two-thirds of enterprise suppliers are questioned about their cyber security training
GDPR:Report