A collection of articles, interviews and videos focused on helping Information Security Leaders change the security culture within their organisation.

Women in technology Video interview with Yubico Founder, Stina Ehrensvärd

Authentication is at the heart of cyber security: it is crucial to securing a network. And yet, single-factor authentication is …

Behaviour Why do we refuse to abandon security processes that don’t work?

Why do we refuse to abandon ideas, equipment, and processes that have proven themselves to be inadequate? It’s rarely because …

Security awareness Who should deliver your security awareness message?

Effective security awareness depends on establishing credibility with your users. This motivates some small awareness shops to employ a high-prestige …

Human factor How to utilise the unlikely similarity between smallpox and security

Mike Kiser, Security Evangelist at SailPoint, explores how modelling medical epidemics, such as Smallpox,  can help companies strengthen their identity …

Identity Identity and security: A perfect match

Barry McMahon, Senior International Marketing Manager at LogMeIn, explores the ongoing challenges that organisations are facing with identity access management. …

Training A guide to helping people overcome “cyber attack fatigue”

The more that we warn people about threats that don’t manifest in their personal lives, the more likely people become …

Behaviour A guide to recognising our biases and overcoming them

Our brains can be our own worst enemy when it comes to following security controls. It’s not that we don’t …

Training Why “old” skills still have practical value for cyber security

It’s easy to feel overwhelmed by the madcap pace of change in technology. Sometimes it might feel like all our …

Women in technology “Some of the best security management I’ve worked for have been women”

With companies now championing and encouraging diversity into the workplace, Kevin McPeake, Cybersecurity Culture and Ethics Specialist, Peak security, shares …

Training Want to improve your security? Understand the cognitive bias behind decision-making

People like to believe they’re perfectly rational beings. It can be a shock to learn that we’re not. It’s critical …

Training Cyber security through storytelling: which approach will motivate your users?

Oh no! The users have learned about a terrible new cyber threat and want immediate guidance! What do you do? …

IAM IAM: how analytics is changing everything

idax uses entitlement information to generate insights into who has access to either data or systems they should not have. …