Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

Isn’t This Supposed To Be Boring? My Experience With Living Security Training.

The man stares intently at the screen of his computer, the light casting an eerie glow on his face...

Read More

CIB_phishing-1

    Living Security Community's Blog Contest Winner: Are You Waving the Wrong Red Flag?

    The Living Security Community is excited to announce Peter Kirwan as the winner of our recent blog...

    Why The National Cybersecurity Alliance Agrees That PEOPLE Are Your Greatest Security Defense

    Twenty years ago, personal device technology was just beginning to advance. Computers existed, but...

    Why Once-a-Year Security Training Isn’t Enough

    Cybersecurity awareness month is just around the corner, and all over the country, CISOs and...

    How To Measure Cybersecurity Behavior and Drive Long-Lasting Cultural Change

    Chief information security officers everywhere work to instill a culture of security awareness in...

    The History of Cybersecurity Awareness Month

    It’s almost here: the month program owners like you have been waiting for … Cybersecurity Awareness...

    Living Security Partners with USDA to Host a CyberEscape Online Experience for Students

    People often equate cybersecurity with the office, viewing it as something that adults learn about...

    Webinar Recording: CISO George Finney

    On Thursday, August 26, we are honored to host the CISO of Southern Methodist University, George...

    5 Questions to Decide if Your Phishing Simulation Training Is Ethically Sound

    Many companies conduct phishing simulations to test employee’s readiness for email-based social...

    CISO Interview Series: The Transformational CISO with Aurobindo Sundaram

    Welcome to The Transformational CISO, a new series of conversations where we get to know...

    Prev 1 2 3 4 5 Next