Separating Hype from Reality in HRM
With the rise of HRM, a variety of new technologies have also emerged on the market. However, how do you navigate the sea of buzzwords and shiny promises to pick the solution that's right for you?
Discover our latest articles on cyber security and human risk management. Have a click around to explore blogs, news, tips, and more. Or subscribe to our newsletter to stay in the loop!
With the rise of HRM, a variety of new technologies have also emerged on the market. However, how do you navigate the sea of buzzwords and shiny promises to pick the solution that's right for you?
Training alone isn't enough to change security behaviours. Explore the different human error types and strategies for building a resilient security ecosystem.
Explore the limitations of Security Awareness Month and discover strategies for fostering a lasting cyber security culture. Learn how automation and AI-driven platforms can mitigate risks and enhance employee security behaviours.
Security nudges not only help identify risks that might otherwise go unnoticed but also dramatically reduce the time needed to resolve incidents—from days to mere minutes, or even seconds.
As AI becomes more commonplace, concerns about misinformation and misuse arise. So, how can we empower employees to harness AI without risking security?
CultureAI has closed a $10 million Series A funding round. The funding was jointly led by Mercia Ventures and Smedvig Ventures, with existing investors Passion Capital and Senovo also continuing their support.
In this blog, we'll explore the importance of addressing credential sharing within an organisation, the risks it poses, and practical steps you can take to mitigate this risk.
As deepfake technology becomes more advanced, it becomes harder to spot the fakes. But how concerned should you be, and what can your organisation do to better prepare?
What should companies be doing to protect your data? And if you work for or own an organisation that manages other people’s data, what can you do to prevent errors or risks of data loss?
In this blog, we'll delve into the reasons behind this positive trend and share strategies to further enhance phishing reporting within your company.
Discover why MFA fatigue happens, how cybercriminals exploit this phenomenon, and the best practices to minimise vulnerability to such attacks.
Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviours to get a holistic view of your risks. By doing so, you can focus resources more efficiently.
Discover the transformative power of security culture as we explore its three phases: from traditional training methods, through the integration of real-time testing, to the adoption of trigger-based interventions.
Adaptive human security isn't just about keeping your organisation safe; it's about making security a seamless and integral part of everyday life.
A simulated phishing test serves as a powerful tool to assess employee reactions to potential attacks, pinpoint vulnerabilities in their behaviour, and deliver targeted training to reinforce their awareness and resilience against increasingly sophisticated phishing threats.