Why the threat of phishing can’t be ‘trained away’

The Security Awareness Special Interest Group (SASIG) connects cybersecurity professionals from all areas. TSC invites SASIG Supporters to share their cybersecurity insights in The Insider. In this piece, we review a report from machine learning email security company Tessian, that opens up the issue of how training and technology should be applied to combat phishing. […]

Read More
Let’s wrap it up!

An infosec review of 2019. Lauren Groom looks back over the infosec year and the five key lessons we learned going in to 2020 Throughout 2019 we saw high profile information security incidents and events, from accidental data breaches to ransomware. The threat to Internet of Things (IoT) devices has continued to increase, and phishing […]

Read More
Construction and cyber – fundamental foundations

Martin Leggett talks hard hats and hackers with Steve Witty of Willmott Dixon. By his own admission, Steve Witty can take a hard-bitten view of the world of recruitment. “I’m in my 50s and I can be quite cynical about calls out of the blue,” he told me as we chatted on a rainy afternoon […]

Read More
Connecting cybersecurity to success

In only two years, Cyber Security Connect UK has become the event to attend for CISOs serious about increasing their information security success. In November, SASIG Events once again partnered with DG Consultants to stage Cyber Security Connect UK 2019 in Monaco. The event built on the success of 2018 by moving to the principality’s […]

Read More
Owning your digital footprint

Take control before someone else does. Complementing her previous article on the company’s digital footprint, Rachael West explains threats to your personal digital footprint and how you can own and protect it. Have you ever Googled yourself? You may be surprised by what information you can find about yourself just from a simple online search. […]

Read More
Owning your company’s digital footprint

Your organisation’s credentials are out there for all to see. Marketing messages, business statements, company information and everything written, posted or downloaded leaves a permanent trace in cyberspace. This is your organisation’s digital footprint. It is your online identity, made up of your unique set of traceable online activities, communications and information. Everything that goes […]

Read More
Evolution of threats and phishing

Treating threats as though they’re human – three blips on the threat radar and what you can do about them Constantly changing.Ever more complex.A landscape evolving at break-neck speed. OK, let’s put a pause on the hyperbolic arms race around cyber threats for just a teeny tiny moment. Because the threats themselves aren’t really evolving. […]

Read More
Why do people make mistakes?

TSC’s sister organisation, the Security Awareness Special Interest Group (SASIG) connects cybersecurity professionals from all areas. We invite SASIG Supporters to share their cybersecurity insights in The Insider. In this piece, we review a report from machine learning email security company Tessian, delving into human error, the reasons why it happens and how to minimise […]

Read More
Diversity to solve problem of bias in AI

Martin Leggett explores a new angle to diversity. The diversity problem in cybersecurity has gained another dimension of late. It seems the good-guy AI algorithms we’re relying on as a bulwark against a hyper-agile threat community are developing a bias problem. From racially flawed facial recognition to recruitment aids that discriminate against women to one-sided […]

Read More
6 reasons your behavioural change plan failed

Or…why behavioural change plans fail to engage and inspire change with your employees. The best laid plans never survive contact with the enemy – so says the military man. Of course, a behavioural change plan for transforming your security culture starts from an altogether more positive place. After all, your staff aren’t your enemy (and […]

Read More
This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy