Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
How internet-connected devices can affect victims of gender-based domestic and sexual violence and abuse
How will IoT impact on gender-based domestic violence and abuse and what socio-technical measures will need to be implemented in order to mitigate against those risks?
Cognitive biases in information security causes, examples and mitigation
This article makes a contribution to the theory of the human factor in the information security by exploring how errors in thinking distort the perceptions of InfoSec issues. Besides examples from the practice, the author proposes several ideas for mitigating the...
Emerging threats for the human element and countermeasures in current cyber security landscape
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evolving nature of cyber threats. It reflects on the role of social engineering as the entry point of many sophisticated attacks and highlights the relevance of the human...
Investigation of attitudes towards security behaviours
This study researched how a user’s knowledge affects their engagement in security behaviors. Security behaviors were operationalized into two categories: cyber hygiene and threat response behaviors. A sample of 194 San José State University students were recruited to...
10 of the most important cyber security articles of 2017
With new laws, new threats and data breach cover-ups, 2017 was another big year for cyber security. Here are the stories everyone was talking about. 1. New Bill Forces Cybersecurity Responsibility Into the Boardroom In March, a new bill introduced to the US senate...
Managing the introduction of information security awareness programmes in organisations
Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues that security awareness processes are associated with interrelated changes that occur at the organisational, the technological and the...
3 mistakes people make with cyber security training
A 2017 survey revealed 52% of organisations’ cyber security budgets are increasing, with 23% of the increases dedicated to training. At the same time, the UK’s 2017 cyber security breaches survey revealed the number of UK businesses that suffered a breach or attack in...
15 architects building the data-driven future
SiliconRepublic
How the ‘cocktail party effect’ leaves us vulnerable to cyber attack
How the ‘cocktail party effect’ leaves us vulnerable to attack – and what the cyber security industry might be able to do about it With Christmas fast approaching, many of us will soon be attending our annual Christmas parties. At such parties, it’s impractical for...
NHS will use white hat hackers to probe its own cyber defences
Computing
NHS to hire white hat hackers as part of £20m cybersecurity investment
The Inquirer
NHS remedies cybersecurity weakness with £20m hacker unit
Computer Business Review
Computing – Security Excellence Awards 2017 – and here are the winners
Computing
Winners!
Computing
To pay or not to pay: how the City can learn from the Uber cover-up
Financial News
Avoid A Costly Black Friday Data Breach – Top Tips For Keeping Your Business Secure
Huffington Post UK
How to keep your company secure this Black Friday
Black Friday and Cyber Monday are notoriously conducive to cyber scams. In this article, CybSafe founder Oz Alashe offers five tips on staying safe during the annual sales. ‘If something seems too good to be true, it probably is.’ That’s the mantra cyber security...
Employee information security beliefs in the home environment
Through a series of qualitative interviews with 19 participants, this study looked into and reported several factors influencing employees' security behaviour at home.
The socio-technical impact on security of the healthcare internet of things in the use of personal monitoring devices (PMDs)
This paper sets out a framework that might allow those who use healthcare personal monitoring devices (such as fitness trackers) to better protect their personal information.
What do they really think? Overcoming social acceptability bias in information security research
This study used two techniques to ensure people accurately reported attitudes on information security in the workplace. A key finding was those who believed information security to be the responsibility of the organisation felt security risks to be overstated, whereas...
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture
This study looked into how individual differences and national culture impacted participants’ responses to phishing and spear-phishing emails. The study found a national culture that promoted the needs of the individual (rather than the needs of society) increased the...