Quantcast
Channel: Cyber Security Leadership
Browsing all 231 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Correlation vs Causation

Scientists in various fields adopt statistical methods to determine relationships between events and assess the strength of such links. Security professionals performing risk assessments are also...

View Article


Image may be NSFW.
Clik here to view.

The Psychology of Information Security book reviews

I wrote about my book  in the previous post. Here I would like to share what others have to say about it. “So often information security is viewed as a technical discipline – a world of firewalls,...

View Article


Image may be NSFW.
Clik here to view.

Industrial Control Systems Security: Information Exchange

There are a number of global information exchanges related to industrial control systems security. They offer useful guidelines and standards to help protect the environment. The UK Centre for the...

View Article

Image may be NSFW.
Clik here to view.

Project Manager’s Toolkit

There are many factors that make an effective project manager. From my experience, project managers face the biggest challenges managing and communicating project inter-dependencies, open actions,...

View Article

Image may be NSFW.
Clik here to view.

Productive Security

The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, manufacturing goods or overseeing financial investment. Their main –...

View Article


Image may be NSFW.
Clik here to view.

How employees react to security policies

Information security can often be a secondary consideration for many employees, which leaves their company vulnerable to cyber attacks. Leron Zinatullin, author of The Psychology of Information...

View Article

Image may be NSFW.
Clik here to view.

Security and Usability

Many employees find information security secondary to their normal day-to-day work, often leaving their organisation vulnerable to cyber attacks, particularly if they are stressed or tired. Leron...

View Article

Image may be NSFW.
Clik here to view.

Talking to PhD students about cyber security

I recently had the pleasure to help organise and host PhD students from Royal Holloway, University of London (RHUL), who spent a day at my company interacting with the team in order to gain industry...

View Article


Image may be NSFW.
Clik here to view.

Digital decisions: Understanding behaviours for safer cyber environments

I was invited to participate in a panel discussion at a workshop on digital decision-making and risk-taking hosted by the Decision, Attitude, Risk & Thinking (DART) research group at Kingston...

View Article


Image may be NSFW.
Clik here to view.

Presenting at the IT & Security Forum

I was invited to speak at the IT & Security Forum in Kazan, Russia. The conference spanned over three days and combined technical and non-technical talks, round table discussions and vendor...

View Article

Image may be NSFW.
Clik here to view.

Pokemon Go and Security Awareness

I wrote about the games you can play to enhance your privacy and cyber security knowledge. We also talked about gamification in the security context. But how do we apply this knowledge to “gamify”...

View Article

Image may be NSFW.
Clik here to view.

I’ve been interviewed by Javvad Malik about my career in InfoSec

I’ve been interviewed by Javvad Malik about my career in Information Security. He published the interview on his website The difference between Leron and anyone else that has ever asked for advice is...

View Article

Image may be NSFW.
Clik here to view.

Security and Usability

Many employees find information security secondary to their normal day-to-day work, often leaving their organisation vulnerable to cyber attacks, particularly if they are stressed or tired. Leron...

View Article


Image may be NSFW.
Clik here to view.

‘Wicked’ problems in information security

Incorporating security activities into the natural workflow of productive tasks, makes it easier for people to adopt new technologies and ways of working, but it’s not necessarily enough to guarantee...

View Article

Image may be NSFW.
Clik here to view.

The root causes of a poor security culture within the workplace

Demonstrating to employees that security is there to make their life easier, not harder, is the first step in developing a sound security culture. But before we discuss the actual steps to improve it,...

View Article


Image may be NSFW.
Clik here to view.

Building a security culture

Building on the connection between breaking security policies and cheating, let’s look at a study[1] that asked participants to solve 20 simple maths problems and promised 50 cents for each correct...

View Article

Image may be NSFW.
Clik here to view.

The Psychology of Information Security Culture

In order to reduce security risks within an enterprise, security professionals have traditionally attempted to guide employees towards compliance through security training. However, recurring problems...

View Article


Image may be NSFW.
Clik here to view.

How to Create a Security Culture at the Workplace

October is National Cyber Security Awareness Month(NCSAM) which is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about...

View Article

Image may be NSFW.
Clik here to view.

The Psychology of Information Security – Get 10% Off

IT Governance Publishing kindly provided a 10% discount on my book. Simply use voucher code SPY10 on my publisher’s website. Offer ends 30 November 2016.  

View Article

Image may be NSFW.
Clik here to view.

User Experience Design

Here’s a collection of courses designed to further your knowledge in user experience design. Happy learning! Design Principles: an Introduction – What makes an interface intuitive? How can I tell...

View Article
Browsing all 231 articles
Browse latest View live