A Successful Security Strategy Is All About Relationships. Here’s How to Build Them.
Security efforts are not limited to security teams. High impact strategies need to engage everyone from employees to the board of execs, DevOps teams and IT. Learn how how to become not just an effective partner but a trusted advisor across an organization.
Your Legacy Phishing Solution Isn’t Enough to Protect Your Organization
CISO Josh Yavor explains why legacy phishing solutions aren't effective in preventing successful attacks, and what you can do about it.
9 Things I’ve Learned Writing Phishing Emails
Ethical hacker, Craig Hays, explains why copywriting, timing, and context are all essential "ingredients" in crafting a phishing attack.
Employee Burnout Will Probably Cause Your Next Data Breach
Understanding how stress impacts cybersecurity behaviors could significantly reduce the chances of people’s mistakes compromising company’s security.
Stateful Machine Learning is Our Best (And Only) Bet
Traditional machine learning methods that are used to detect threats at the machine layer aren’t equipped to account for the complexities of human relationships and behaviors across businesses over time. There is no concept of “state” — the additional variable that makes human-layer security problems so complex.
How Easy Is It to Phish?
You don't have to be tech savvy to become a "hacker". This blog outlines how to create a phishing campaign, and was designed to help security leaders protect their organizations.

Explore Human Layer Security.

Learn About Our Mission
Subscribe to our newsletter
Explore Me
Read More
The go-to destination for Human Layer Security thought leadership, brought to you by Tessian. Learn About Our Mission
Why Hacking Humans is Easier Than Hacking Software
In a recent Tessian podcast episode, ethical hacker Craig Hays divulged his secrets and discussed why social engineering attacks are on the rise - all from the point of view of an attacker.
Less Talking, More Listening: The Power of Paying Attention in InfoSecurity
Bobby Ford, CSO at HP Enterprise explains what he's learned from his career so far, and why listening is the key to keeping our data safe.
A Successful Security Strategy Is All About Relationships. Here’s How to Build Them.
Security efforts are not limited to security teams. High impact strategies need to engage everyone from employees to the board of execs, DevOps teams and IT. Learn how how to become not just an effective partner but a trusted advisor across an organization.
How to Lead With Empathy: Q&A With Tracy Z. Maleeff
Tracy Z. Maleeff gives advice on how to break into the industry, explains how her background in library sciences helps her in security, and more. Read now.
How to Adapt Your Security Strategy For a Remote Workforce
Elvis Chan, Supervisory Special Agent of the FBI and Bobby Ford CSO at Hewlett Packard discuss how the threat landscape has changed around the world.
The Rise of the New-School CISO
The most successful Chief Information Security Officers (CISOs) have at least 5 things in common. Learn more about the winning combination.
Human Layer Topics See All Posts

Explore Categories