Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Business Exposed: Employees Spill More Secrets to AI Than They Would to Friends in the Bar
Surge in cybersecurity threats as employees: Struggle to identify Generative AI content, with only 21% believing they can discern an AI generated piece of text from human written text. Admit to sharing sensitive information with AI tools that they wouldn't divulge in...
On demand webinar: 30 proven ways to increase security awareness engagement
ON DEMAND WEBINARSupercharge security awareness engagement30+ proven ways to increase security awareness engagementHuman-related security breaches continue to haunt organizations of all sizes. Why? Largely it’s because most security awareness initiatives are...
The surprising damage cyberbullying does to organizations
Bully for you: How cyberbullying impacts your organization's security, and how you can hit back Steve works in HR. He’s the go-to person for many people when they have problems and need support. But Steve has a problem of his own: he’s been dealing with cyberbullying...
Security Awareness Engagement Taxonomy
Security Awareness Engagement Taxonomy Human-related security breaches continue to haunt organizations of all sizes. Why? Largely it’s because most security awareness initiatives are mind-numbingly dull, failing to captivate the savvy minds of the modern age. Ask...
Employment identity theft: When a personal data heist becomes a professional-level problem
Identity crisis: Identity theft hurts organizations too Picture this: It's 2019, and a woman is charged by the U.S. Department of Justice for using stolen identities to snag employment and healthcare services. But this isn't your typical identity theft case. This...
The thing letting your security awareness training down
What you keep getting wrong about security awareness training Consistency trumps intensity. But when it comes to security awareness training, old-school approaches focus on intensity. Or to put it another way, if there’s a regulatory or compliance deadline on the...
From home sweet home to home safe home: How to maintain security when employees work remotely
“Invite to pay raise briefing? Yes! Finally!” Sarah (a remote worker) leapt up from her dining room table and danced around the room with her dog. Since 2020, Sarah’s been working remotely. At first it was surreal. Then it just slowly became the new normal. ...
The official guide to CybSafe products and pricing
The definitive guide to CybSafe products and pricing In case you haven’t heard, we’re CybSafe, the human risk management platform with lofty ambitions . . . like revolutionizing cybersecurity. But more about that later. We’ve never shied away from a challenge. So,...
The ripple effect: How one phishing attack can cause disaster across your organization
How phishing has catastrophic effects on organizations Phishing attacks are a certified menace. And it doesn’t matter what size or shape your organization is. Or where it is. Or whether you have dress-down Fridays. What’s more, phishing attacks are on the rise. Safe...
AI companion or cybersecurity nightmare? Is ChatGPT safe to use?
Is ChatGPT safe to use? The cybersecurity risks everyone needs to know aboutToday we’re going to address 2023’s robotic elephant in the room. No doubt, artificial intelligence (OpenAI, anyone?) is mind-blowing. It can do some amazing stuff. At CybSafe, we're big fans...
SebDB Connect
SebDB Connect is a day-long event that brings together experts, thought leaders, and innovators to share their ideas and insights on the latest developments in the human cyber risk space. Register here.
Proven Methods to Prevent Human-Based Security Mistakes
Security Intelligence
SebDB Community x Slack
What is SebDB Slack? SebDB Slack is a dedicated, invite-only network of human risk professionals. It’s the perfect place to discuss trends, give and get advice, share stories and uncover insights. SebDB Slack will quickly become your ‘secret weapon’ to unlocking and...
The Ransomware Toolkit
RANSOMWARE PREVENTION The Ransomware Toolkit Ransomware is one of the most serious and damaging threats to cybersecurity. Which is why our efforts to write, talk, and learn about it are relentless. And you can find the fruits of our labor right here in one neat...
You and whose army? You can’t outsmart ransomware attacks alone
Ransomware’s the gift that keeps on giving (headaches), but here’s a remedy Ransomware is a real pain. No sane cybersecurity professional would say otherwise. But most people—yes, even plenty of cyber professionals—struggle to take into account the impact it can have...
Train smart, not hard! The intelligent approach to phishing training
Hack a punch: Why intelligent phishing simulation is vital in the fight against scammers Your friend Andy’s always been interested in kickboxing. So he joins a beginner’s class where he rehearses all the moves and works on his fitness. Bit by bit, he perfects his form...
Measuring the effectiveness of security awareness programs: What you need to know
From meh to mega-metrics: How to measure the impact of your security awareness training You move into a new house—congratulations! It’s beautiful. Period features. Original wooden floors. One of those shiny overhead showers. Views for days. One downside: The basement...
SebDB Connect
This event has now passed, please join the community to be notified on the next oneWhat is SebDB Connect? SebDB Connect is a day-long event that brings together experts, thought leaders, and innovators to share their ideas and insights on the latest...
5 big factors in a strong cybersecurity culture
What you need to know about assessing your cybersecurity culture Security culture. It’s not a new concept. The phrase has been thrown around for years and years. But in that concept lies a few challenges. Like defining its shape, parameters, where it starts, and...
Top 4 types of security awareness training – and the pros and cons of each
What are the four types of security awareness training, and what can they do?Your friend Mona is desperate to learn how to play guitar. So one day she buys a book called The Ultimate Guide to Becoming a Guitar Pro. She spends hours reading it. But when she picks up...
Abuse victims’ data stolen in ransomware attack on Derry company
Silicon Republic