X

Living Security named a Leader in Forrester Wave: Security Awareness and  Training Solutions, Q1 2022 - Read Report Here

Living Security Blog

Stay on top of the latest in cybersecurity human risk management including security fundamentals, phishing, and security awareness

 

Meet Ansel Lowry, Narrative Designer for Living Security’s Content Team

What makes Living Security’s security awareness training so different? Simply put, we have the best...

Read More

CIB_phishing-1

    How To Secure an Employee’s Home Router and Prevent Cyber Fraud

    If you’re part of the growing labor force that’s working from home, you likely have access to...

    CISO Interview Series: The Transformational CISO with Dan Walsh of VillageMD

    This webinar is part of our new series, The Transformational CISO, where we get to know...

    Meet Morgan Obregon, Production Manager for Living Security’s Content Team

    What makes Living Security’s security awareness training so different? Simply put, we have the best...

    7 Ways To Maintain Security While Employees Are Working Remotely

    Since early 2020, many organizations have been leaving the office to work from home, creating a...

    Cybersecurity at Home: Family First Webinar Featuring Cyber News Reporter Kerry Tomlinson

    This Family First webinar was produced especially for our Cybersecurity Awareness Month customers....

    New Forbes Article: Cybersecurity Training Is Broken — It's Time To Consider Human Risk Management

    Check out this juicy tidbit from Living Security CEO Ashley Rose’s newest piece in Forbes:

    Meet David West, Head of Living Security’s Content Creative

    What makes Living Security’s security awareness training so different? Simply put, we have the best...

    Meet the Creative Dream Team Behind Living Security’s Popular Training Videos

    CISOs and program owners love Living Security’s on-demand training and team exercises because...

    The Latest From Breaking Security Awareness Webinar Series

    With remote work providing new access points for threat actors, cybersecurity is at the forefront...

    Prev 2 3 4 5 6 Next