Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
4 tips for building a strong security culture
CSO
CybSafe becomes an associate partner to the Centre for Research and Evidence on Security Threats
At CybSafe, we’re building a future that reshapes the way organisations approach human cyber risks. We see science as an integral part of understanding human behaviour. There are hundreds of cyber security companies focussing on human cyber risk, but CybSafe is one of...
SC Awards Europe Winners Announces
SC Magazine
Mixed methods research approach and experimental procedure for measuring human factors in cyber security using phishing simulations
As cyberattacks increasingly disrupt business operations, organizations are putting more emphasis on human factors—training and evaluating individuals to reduce potential risks. Phishing experiments, which utilize deceptive messages to coerce people into performing...
How digital natives make their self-disclosure decisions: A cross-cultural comparison
Digital natives have become significant users of social network sites (SNSs); therefore, their disclosed personal information can be misused by SNS providers and/or other users. The purpose of this paper is to understand how digital natives make their self-disclosure...
Gnosticplayers: why the hacker behind the Canva data breach boasted to the media
Verdict
People Centric Cyber Security e-Book
People-centric security How to place people at the heart of your cyber resilience strategy and unlock the benefits of an enhanced cyber defenceIs it time to reconsider traditional approaches to cyber security? For a long time now, people have largely been viewed as a...
Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system
The study sought to understand the impact of a phishing training program on phishing click rates for employees at a single, anonymous US healthcare institution. We stratified our population into 2 groups: offenders and nonoffenders. Offenders were defined as those...
Utility of artificial intelligence and machine learning in cyber security
The paper specifically discusses selected publications that relate artificial intelligence (AI) in general, or machine learning (ML) in particular, to cybersecurity and specifically to the cybersecurity of system development and life cycle environments (SDLE) and...
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the...
Adapt for the era of virtual distribution
Microscope
Fines might help the channel spark more GDPR urgency
Microscope
One year on: most companies still not GDPR-compliant
Law Donut
UK businesses are still falling way short on GDPR compliance: report
Mobile Marketing
Brits do not get GDPR
Fudzilla
Establishing human factors programs to mitigate blind spots in cyber security
Many business organizations overlook the importance of a human factors program, failing to address human-centric issues and problems that often lead to cybersecurity incidents, substantial financial losses, reputational damage, and decreased productivity. Other...
Cyber security leaders from the ICO, the Bank of England, The Hut Group, Aviva, and KPMG announced as speakers for PeepSec
London Tech Week summit, PeepSec, to host its annual summit focused on people and technology Level 39, London, 15 May 2019: PeepSec - the annual online summit focused on the issues born from the interactions between people and technology - today announced the...
Is the glass half full or half empty when it comes to security?
Digitalisation World
Challenges of implementing training and awareness programs targeting cyber security social engineering
Information security is one of the growing sources of concern that organizations are dealing with today. With increased levels of sophistication of social engineering threats, the exploits from such attacks are evolving. This study highlights some of the challenges...
Using behavioural science to boost cyber security awareness
Channel Pro
Let’s punish phishing victims… er, you want to do what?!
There is a big, hairy elephant in the room when it comes to phishing: Many organisations believe that it’s okay, or right, or that they have no choice other than to punish people who repeatedly fail phishing simulations. Are they right? Before we answer that, let’s...