Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
The role of psychology in understanding online trust
Across many online contexts, internet users are required to make judgments of trustworthiness in the systems or other users that they are connecting with. But how can a user know that the interactions they engage in are legitimate? In cases where trust is manipulated,...
Gender and IoT
How will IoT impact on gender-based domestic violence and abuse and what socio-technical measures will need to be implemented in order to mitigate against those risks?
Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users
In light of the omnipresence of personal information exchange in the virtual world, this study examines the effects of Facebook use on privacy perceptions and self-disclosure behaviors across a 5-year period from 2010 to 2015. Findings at the global level support the...
Correlating human traits and cyber security behavior intentions
In this paper, we correlate human characteristics with cyber security behavior intentions. While previous papers have identified correlations between certain human traits and specific cyber security behavior intentions, we present a comprehensive study that examines...
How internet-connected devices can affect victims of gender-based domestic and sexual violence and abuse
How will IoT impact on gender-based domestic violence and abuse and what socio-technical measures will need to be implemented in order to mitigate against those risks?
Cognitive biases in information security causes, examples and mitigation
This article makes a contribution to the theory of the human factor in the information security by exploring how errors in thinking distort the perceptions of InfoSec issues. Besides examples from the practice, the author proposes several ideas for mitigating the...
Emerging threats for the human element and countermeasures in current cyber security landscape
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evolving nature of cyber threats. It reflects on the role of social engineering as the entry point of many sophisticated attacks and highlights the relevance of the human...
Investigation of attitudes towards security behaviours
This study researched how a user’s knowledge affects their engagement in security behaviors. Security behaviors were operationalized into two categories: cyber hygiene and threat response behaviors. A sample of 194 San José State University students were recruited to...
10 of the most important cyber security articles of 2017
With new laws, new threats and data breach cover-ups, 2017 was another big year for cyber security. Here are the stories everyone was talking about. 1. New Bill Forces Cybersecurity Responsibility Into the Boardroom In March, a new bill introduced to the US senate...
Managing the introduction of information security awareness programmes in organisations
Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues that security awareness processes are associated with interrelated changes that occur at the organisational, the technological and the...
3 mistakes people make with cyber security training
A 2017 survey revealed 52% of organisations’ cyber security budgets are increasing, with 23% of the increases dedicated to training. At the same time, the UK’s 2017 cyber security breaches survey revealed the number of UK businesses that suffered a breach or attack in...
15 architects building the data-driven future
SiliconRepublic
How the ‘cocktail party effect’ leaves us vulnerable to cyber attack
How the ‘cocktail party effect’ leaves us vulnerable to attack – and what the cyber security industry might be able to do about it With Christmas fast approaching, many of us will soon be attending our annual Christmas parties. At such parties, it’s impractical for...
NHS will use white hat hackers to probe its own cyber defences
Computing
NHS to hire white hat hackers as part of £20m cybersecurity investment
The Inquirer
NHS remedies cybersecurity weakness with £20m hacker unit
Computer Business Review
Computing – Security Excellence Awards 2017 – and here are the winners
Computing
Winners!
Computing
To pay or not to pay: how the City can learn from the Uber cover-up
Financial News
Avoid A Costly Black Friday Data Breach – Top Tips For Keeping Your Business Secure
Huffington Post UK
How to keep your company secure this Black Friday
Black Friday and Cyber Monday are notoriously conducive to cyber scams. In this article, CybSafe founder Oz Alashe offers five tips on staying safe during the annual sales. ‘If something seems too good to be true, it probably is.’ That’s the mantra cyber security...