Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Cyber savvy challenge: Unlock your digital security skills
Developing cybersecurity culture to influence employee behavior: A practice perspective
This paper identifies and explains five key initiatives that three Australian organizations have implemented to improve their respective cyber security cultures. The five key initiatives are: identifying key cyber security behaviors, establishing a ’cyber security...
Human systems integration approach to cyber security
The NATO Science and Technology Organization (STO) Human Factors and Medicine (HFM) Panel 259 Research Task Group (RTG), titled Human Systems Integration Approach to Cyber Security, was established to promote cooperative human-centred research activities in a NATO...
2022 Cost of insider threats global report
The first Cost of Insider Threats: Global study was conducted in 2016 and focused exclusively on companies in North America. Since then, the research has expanded to include organizations in Europe, Middle East, Africa and Asia-Pacific with a global headcount of 500...
Blind Spot: Do You Know the Effectiveness of Your Information Security Awareness-Raising Program?
Information and IT security awareness-raising measures and the evaluation of these measures are an indispensable part of today’s information and knowledge society. While the number of firms that apply such measures is increasing, surveys of corporations show that it...
Contextual security awareness: A context-based approach for assessing the security awareness of users
Assessing the information security awareness (ISA) of users is crucial for protecting systems and organizations from social engineering attacks. Current methods do not consider the context of use when assessing users’ ISA, and therefore they cannot accurately reflect...
CybSafe 2023 winter release
Introducing: Workflows and 20+ features [lazy-video video_id="ZbSJ9vibAM0" background_image="https://www.cybsafe.com/wp-content/uploads/2023/12/CYBSAFE-introducing-workflows-thumbnail-231201MS-08.jpg"...
Cybersecurity automation should focus on human risk
Applying cybersecurity automation to human cyber riskAutomated, real-time, and personalized workflowsIntroducing WorkflowsCybersecurity automationA leap forward in human risk managementGetting startedTurning work into WorkflowsAs a security professional managing human...
Why am I failing to engage my workforce in cybersecurity training?
There is an immediate need to shift towards a cybersecurity awareness approach that truly understands the challenges of people today—where personalised, on-demand, and simple experiences aren’t just desired, but expected.
Online safety awareness and human factors: An application of the theory of human ecology
Efforts have been made on large and small scales to reduce cybersecurity threats around the world, including in Malaysia. However, scholars have argued that, in spite of the technological preparations countries can take to shield themselves from attack, human factors...
A zero-shot deep metric learning approach to Brain–Computer Interfaces for image retrieval
In this paper we propose a deep learning based approach for image retrieval using EEG. Our approach makes use of a multi-modal deep neural network based on metric learning, where the EEG signal from a user observing an image is mapped together with visual information...
From awareness to influence: toward a model for improving employees’ security behaviour
This paper argues that a conventional approach to cybersecurity awareness is not effective in influencing employees and creating sustainable behaviour change. The increase in security incidents caused by employees is evidence that providing information to raise...
About the Measuring of Information Security Awareness: A Systematic Literature Review
To make employees aware of their important role for information security, companies typically carry out security awareness campaigns. The success and effectiveness of those campaigns has to be measured to justify the budget for example. Therefore, we did a systematic...
Developing metrics to assess the effectiveness of cybersecurity awareness program
Cybersecurity awareness (CSA) is not just about knowing, but also transforming things learned into practice. It is a continuous process that needs to be adjusted in subsequent iterations to improve its usability as well as sustainability. This is possible only if a...
CybSafe research uncovers a distinct gap in workplace Cybersecurity prioritisation
Research finds 31 per cent of people are more likely to prioritise keeping on top of emails than cybersecurity training The fundamental shift in our content consumption habits calls for a new approach to cybersecurity training in the workplace Canary Wharf, London, XX...
A systematic review of current cybersecurity training methods
Cybersecurity continues to be a growing issue, with cyberattacks causing financial losses and loss of productivity and reputation. Especially in an organisational setting, end-user behaviour plays an essential role in achieving a high level of cybersecurity. One way...
Developing a cyber security culture: Current practices and future needs
While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In this article, we...
Conceptualization of a cybersecurity awareness quiz
Recent approaches to raise security awareness have improved a lot in terms of user-friendliness and user engagement. However, since social engineering attacks on employees are evolving fast, new variants arise very rapidly. To deal with recent changes, our serious...
Asset Management: The ‘wizard of Westport’
The Financial Times
ICBC trying to curb impact of US ransomware attack, says China
The New Zealand Herald
Wall Street and Beijing fight fallout of ransomware attack on China’s biggest bank
The Financial Times