Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

Webinar Recording: The CISO Perspective on Why Human Risk Management is Superior to Security Awareness & Training

On May 12th, 2022, Living Security CSO and co-founder Drew Rose was joined by Omar Khawaja, the...

How to Effectively Leverage Data to Assess Cyber RIsk

Changing the future of security is about changing culture. It’s about changing the conversation,...

3 Key Reasons to Ditch Boring Compliance-Based Training

One of the biggest missed opportunities in cybersecurity training is ticking the compliance box to...

Webinar Recording: The State of the Scam

On April 21st, 2022, Senior Security Advisor at Living Security, Jenny Kinney, was joined by...

Why Personalization Matters in Human Risk Management

When you need crucial information, there’s nothing more frustrating—and less effective—than having...

The Next Wave: Human Risk Management

As a co-founder of Living Security, I am so proud of our team and what we’ve accomplished in just...

Webinar Recording: Building & Implementing Effective Incident Response & Recovery Plans

On March 24th, 2022, our CSO Drew Rose was joined by featured guests Vinitha Varadarajan, Senior...

Webinar Recording: Securing Your "Human Firewall"

On March 23rd, 2022, our CEO Ashley Rose led a lively discussion with featured guests Brian...

Living Security Named a Leader in Security Awareness and Training Evaluation

We are proud to announce that Living Security has been recognized as a leader in the Forrester...

How Top CISOs Are Creating Long-Lasting Behavior Change

Chief information security officers (CISOs) have the difficult job of overseeing an organization’s...

Cybersecurity Games To Make Your Employees Aware

Cybersecurity can be FUN. Is it possible to create an environment in which people want to high-five...

How To Derive Cyber Threat Intelligence From the Inside

Sharing ideas internally on how to recognize and respond to cybersecurity threats can drastically...