Correlation vs Causation
Scientists in various fields adopt statistical methods to determine relationships between events and assess the strength of such links. Security professionals performing risk assessments are also...
View ArticleThe Psychology of Information Security book reviews
I wrote about my book in the previous post. Here I would like to share what others have to say about it. “So often information security is viewed as a technical discipline – a world of firewalls,...
View ArticleIndustrial Control Systems Security: Information Exchange
There are a number of global information exchanges related to industrial control systems security. They offer useful guidelines and standards to help protect the environment. The UK Centre for the...
View ArticleProject Manager’s Toolkit
There are many factors that make an effective project manager. From my experience, project managers face the biggest challenges managing and communicating project inter-dependencies, open actions,...
View ArticleProductive Security
The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, manufacturing goods or overseeing financial investment. Their main –...
View ArticleHow employees react to security policies
Information security can often be a secondary consideration for many employees, which leaves their company vulnerable to cyber attacks. Leron Zinatullin, author of The Psychology of Information...
View ArticleSecurity and Usability
Many employees find information security secondary to their normal day-to-day work, often leaving their organisation vulnerable to cyber attacks, particularly if they are stressed or tired. Leron...
View ArticleTalking to PhD students about cyber security
I recently had the pleasure to help organise and host PhD students from Royal Holloway, University of London (RHUL), who spent a day at my company interacting with the team in order to gain industry...
View ArticleDigital decisions: Understanding behaviours for safer cyber environments
I was invited to participate in a panel discussion at a workshop on digital decision-making and risk-taking hosted by the Decision, Attitude, Risk & Thinking (DART) research group at Kingston...
View ArticlePresenting at the IT & Security Forum
I was invited to speak at the IT & Security Forum in Kazan, Russia. The conference spanned over three days and combined technical and non-technical talks, round table discussions and vendor...
View ArticlePokemon Go and Security Awareness
I wrote about the games you can play to enhance your privacy and cyber security knowledge. We also talked about gamification in the security context. But how do we apply this knowledge to “gamify”...
View ArticleI’ve been interviewed by Javvad Malik about my career in InfoSec
I’ve been interviewed by Javvad Malik about my career in Information Security. He published the interview on his website The difference between Leron and anyone else that has ever asked for advice is...
View ArticleSecurity and Usability
Many employees find information security secondary to their normal day-to-day work, often leaving their organisation vulnerable to cyber attacks, particularly if they are stressed or tired. Leron...
View Article‘Wicked’ problems in information security
Incorporating security activities into the natural workflow of productive tasks, makes it easier for people to adopt new technologies and ways of working, but it’s not necessarily enough to guarantee...
View ArticleThe root causes of a poor security culture within the workplace
Demonstrating to employees that security is there to make their life easier, not harder, is the first step in developing a sound security culture. But before we discuss the actual steps to improve it,...
View ArticleBuilding a security culture
Building on the connection between breaking security policies and cheating, let’s look at a study[1] that asked participants to solve 20 simple maths problems and promised 50 cents for each correct...
View ArticleThe Psychology of Information Security Culture
In order to reduce security risks within an enterprise, security professionals have traditionally attempted to guide employees towards compliance through security training. However, recurring problems...
View ArticleHow to Create a Security Culture at the Workplace
October is National Cyber Security Awareness Month(NCSAM) which is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about...
View ArticleThe Psychology of Information Security – Get 10% Off
IT Governance Publishing kindly provided a 10% discount on my book. Simply use voucher code SPY10 on my publisher’s website. Offer ends 30 November 2016.
View ArticleUser Experience Design
Here’s a collection of courses designed to further your knowledge in user experience design. Happy learning! Design Principles: an Introduction – What makes an interface intuitive? How can I tell...
View Article