Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
CybSafe appoints Mark Edge as Chief Revenue Officer
Prolific London
CybSafe appoints Mark Edge as Chief Revenue Officer to Fuel Further Growth
AiThority
CybSafe appoints CRO ahead of channel building campaign
Comms Dealer
CybSafe hires new channel head
IT Europa
Treasury cybersecurity: Dealing with the growing threat [part 2]
Global Treasurer
Behavior change: An intelligent approach for cybersecurity
Behavior Change An intelligent approach for cyber securityIn this whitepaper, we outline the CybSafe approach to applying behavioural science, how it’s embedded in everything we do and how our products drive behavior change in employees. Contents: About CybSafe...
How to identify and manage cybersecurity risks in your supply chain
Achilles
Some simulated attacks help reduce cyber risk. Others are redundant. What’s the difference?
Here’s an interesting conundrum for cyber security professionals. Some simulated attacks reduce human cyber risk. Others, however, have no effect on risk – and may even have a negative impact. Even more perplexing: an identical course of simulated...
Oz Alashe Appearing on BBC Business Live – Inside Track
Oz Alashe Appearing on BBC Business Live – Inside Track
A fifth of small businesses ‘have lost contracts’ after they were used to attack a customer
SC Magazine
Meet the top 10 fastest growing SaaS startups in Europe in 2019
Silicon Canals
Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?
Security Intelligence
The two most common phishing scams that affect UK businesses
Phishing scams evolve constantly. Don’t they? On the one hand, yes. Sophisticated cyber criminals are very much aware that, once a phishing scam becomes well known, its potency falls. So, over time, phishing scams adapt and evolve. On the other hand, the the nuts and...
Why it is difficult to stop targeted email attacks
IT World
Expert Panel: Can MFA work long term if customers prefer convenience over security?
ID Bulletin
What is spear phishing? Why targeted email attacks are so difficult to stop
CSO
Phishing versus spear phishing
CIO
CybSafe expands distribution footprint with SCOPE ME
Tahawultech
Collection #1 data breach sees 773 million email IDs, 21 million passwords visible in massive data dump
GDPR.Report
Cognitive processing of phishing emails
Phishing, the process of tricking people using emails and imitation of websites, has been studied from different points of views (computer sciences, engineering, economy, security and sociology) while the matter largely involves social cognition. This scoping review...
Remote Working Leading To More Data breaches
The Cloud Consultancy