A Successful Security Strategy Is All About Relationships. Here’s How to Build Them.
Security efforts are not limited to security teams. High impact strategies need to engage everyone from employees to the board of execs, DevOps teams and IT. Learn how how to become not just an effective partner but a trusted advisor across an organization.
Your Legacy Phishing Solution Isn’t Enough to Protect Your Organization
CISO Josh Yavor explains why legacy phishing solutions aren't effective in preventing successful attacks, and what you can do about it.
9 Things I’ve Learned Writing Phishing Emails
Ethical hacker, Craig Hays, explains why copywriting, timing, and context are all essential "ingredients" in crafting a phishing attack.
Employee Burnout Will Probably Cause Your Next Data Breach
Understanding how stress impacts cybersecurity behaviors could significantly reduce the chances of people’s mistakes compromising company’s security.
Stateful Machine Learning is Our Best (And Only) Bet
Traditional machine learning methods that are used to detect threats at the machine layer aren’t equipped to account for the complexities of human relationships and behaviors across businesses over time. There is no concept of “state” — the additional variable that makes human-layer security problems so complex.
How Easy Is It to Phish?
You don't have to be tech savvy to become a "hacker". This blog outlines how to create a phishing campaign, and was designed to help security leaders protect their organizations.

Explore Human Layer Security.

Learn About Our Mission
Explore Me
Read More

Thought Leadership

See All Posts

Industry experts share top tips, hot takes, and more. Contributors include ethical hackers, CISOs, CEOs, and IT practitioners.

Research

See All Posts

Security, risk, and compliance leaders share original research and threat intelligence to help you stay a step ahead.

Video

See All Posts

Check out our video library and watch candid Q&As, explainer videos, and panel discussions. Topics include security culture, training, spear phishing, and more.

Social Engineering

See All Posts

The industry’s most trusted cybersecurity leaders share tips, best practice, and real-life stories about social engineering attacks.

Security Awareness Training

See All Posts

Want to level-up your security awareness training program? Industry leaders share tips and best practice to help you engage with employees and change behavior long-term.

Interviews

See All Posts

We sit down with industry leaders across industries to discuss threats, the ROI of cybersecurity, the role of the CISO, and more. Watch video Q&As, listen to podcasts, or read the key takeaways.

Data Loss Prevention

See All Posts

Data loss prevention (DLP) can be a challenge. Industry experts offer advice and commentary in recent breaches to help you improve your DLP strategy.

Podcast

See All Posts

RE: Human Layer Security Podcast flips the script on cybersecurity and addresses the human factor. Guests share best practices, cybersecurity challenges, threat intel, and more.

Blog

See All Posts

Explore our content library to get tips from industry leaders around human error, social engineering, and the role of the CISO.

Human Error

See All Posts

85% of data breaches are caused by human error, which makes it a top concern for IT and security leaders. But people aren’t as easy to secure as networks and devices. Explore the scope of the problem, and get advice from your peers.

Events

See All Posts

Be the first to hear about upcoming events and get summaries and key takeaways from cybersecurity webinars, conferences, and more.

Remote Work

See All Posts

The perimeter has disappeared with remote and hybrid working environments. Industry leaders offer advice and share insights on what’s next.

Security Culture

See All Posts

Building a strong security culture starts from the top down. But influencing key stakeholders and empowering employees is easier said than done. Get insights and tips from industry leaders.