A Successful Security Strategy Is All About Relationships. Here’s How to Build Them.
Security efforts are not limited to security teams. High impact strategies need to engage everyone from employees to the board of execs, DevOps teams and IT. Learn how how to become not just an effective partner but a trusted advisor across an organization.
Your Legacy Phishing Solution Isn’t Enough to Protect Your Organization
CISO Josh Yavor explains why legacy phishing solutions aren't effective in preventing successful attacks, and what you can do about it.
9 Things I’ve Learned Writing Phishing Emails
Ethical hacker, Craig Hays, explains why copywriting, timing, and context are all essential "ingredients" in crafting a phishing attack.
Employee Burnout Will Probably Cause Your Next Data Breach
Understanding how stress impacts cybersecurity behaviors could significantly reduce the chances of people’s mistakes compromising company’s security.
Stateful Machine Learning is Our Best (And Only) Bet
Traditional machine learning methods that are used to detect threats at the machine layer aren’t equipped to account for the complexities of human relationships and behaviors across businesses over time. There is no concept of “state” — the additional variable that makes human-layer security problems so complex.
How Easy Is It to Phish?
You don't have to be tech savvy to become a "hacker". This blog outlines how to create a phishing campaign, and was designed to help security leaders protect their organizations.

Explore Human Layer Security.

Learn About Our Mission
Explore Me
Read More

Season 2, Episode 1

June 16th, 2021

Kicking off the new season of the RE:Human Layer Security podcast, we are delighted to welcome James McQuiggan, Security Awareness Advocate at KnowBe4.

James speaks to Tim Sadler, CEO at Tessian about a new school approach to security education and awareness, the rise of ransomware and why phishing training should lead with the carrot, not the stick. The episode is packed with advice and anecdotes to help you and your business think about the human factor in your cybersecurity strategy.

Books referenced in the show

  • The Hitchhiker’s Guide to Galaxy,  Douglas Adams
  • Data Driven Defense, Roger Grimes
  • Transformational Security Awareness, Perry Carpenter
  • Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
    Book, Jennifer Jin and Marcus J. Carey
Read James' Full Article