Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Facebook security policy and practices unfit, say infosec pros
Computer Weekly
This week’s London’s appointments
BDaily
Channel roundup: Who’s gone where?
Microscope
CybSafe appoints Mark Edge as Chief Revenue Officer
Prolific London
CybSafe appoints Mark Edge as Chief Revenue Officer to Fuel Further Growth
AiThority
CybSafe appoints CRO ahead of channel building campaign
Comms Dealer
CybSafe hires new channel head
IT Europa
Treasury cybersecurity: Dealing with the growing threat [part 2]
Global Treasurer
Behavior change: An intelligent approach for cybersecurity
Behavior Change An intelligent approach for cyber securityIn this whitepaper, we outline the CybSafe approach to applying behavioural science, how it’s embedded in everything we do and how our products drive behavior change in employees. Contents: About CybSafe...
How to identify and manage cybersecurity risks in your supply chain
Achilles
Some simulated attacks help reduce cyber risk. Others are redundant. What’s the difference?
Here’s an interesting conundrum for cyber security professionals. Some simulated attacks reduce human cyber risk. Others, however, have no effect on risk – and may even have a negative impact. Even more perplexing: an identical course of simulated...
Oz Alashe Appearing on BBC Business Live – Inside Track
Oz Alashe Appearing on BBC Business Live – Inside Track
A fifth of small businesses ‘have lost contracts’ after they were used to attack a customer
SC Magazine
Meet the top 10 fastest growing SaaS startups in Europe in 2019
Silicon Canals
Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is?
Security Intelligence
The two most common phishing scams that affect UK businesses
Phishing scams evolve constantly. Don’t they? On the one hand, yes. Sophisticated cyber criminals are very much aware that, once a phishing scam becomes well known, its potency falls. So, over time, phishing scams adapt and evolve. On the other hand, the the nuts and...
Why it is difficult to stop targeted email attacks
IT World
Expert Panel: Can MFA work long term if customers prefer convenience over security?
ID Bulletin
What is spear phishing? Why targeted email attacks are so difficult to stop
CSO
Phishing versus spear phishing
CIO
CybSafe expands distribution footprint with SCOPE ME
Tahawultech