Articles

Dive into practical advice, research findings, and expert perspectives on building security-aware cultures. Explore evidence-based strategies to strengthen your organization's human security posture.

Showing 1-12 of 15 articles
Behavioural Change

The Security Champion Effect: How One Person in the Right Place Can Change the Entire Risk Profile of a Team

Somewhere in your organisation, a team’s cyber risk is elevated, not from unpatched systems, but behaviour: how files are shared, credentials handled, and requests judged under pressure. Controls and policy exist, yet culture undermines them. Then one well-placed person joins, and within months reporting rises, people pause before clicking, and leaders flag issues early. No mandates, no new training. That is the Security Champion Effect.

Read Article
Behavioural Change

Context-Aware Security Reduces Resistance

There is a familiar paradox at the heart of most enterprise security programmes. The harder organisations push to control human behaviour through rigid, uniform controls, the more creatively employees find ways around them. Security teams tighten the perimeter, and a shadow IT ecosystem quietly flourishes just beyond it. This is not a discipline problem. It is a design problem.

Read Article
Behavioural Change

From Behaviour to Culture: The Science of Lasting Security Transformation

The cybersecurity industry has spent two decades trying to "change culture" through awareness training, phishing simulations, and policy mandates. The results speak for themselves: human factors remain implicated in over 70% of breaches, and most organisations report little meaningful improvement despite significant investment. The problem isn't effort. It's the sequence.

Read Article
Behavioural Change

Security Champions Reimagined

Security Champions programmes are growing. That is the good news. The harder truth is that many programmes plateau after the initial enthusiasm. Champions attend calls, share comms, complete training, and we still see a lot of the same risky behaviours keep surfacing. This article sets out a modern, practical model for helping champion networks to be more effective agents of behaviour

Read Article
Behavioural Change

Skills Framework for Behavioural Cyber Risk Management

While organisations worldwide struggle with a well-documented skills shortage, we simultaneously lack a comprehensive framework that addresses the human and behavioural dimensions of cyber risk management. Technical certifications abound - from CISSP to CEH - but where are the frameworks that guide professionals working at the intersection of human behaviour, psychology, and cybersecurity?

Read Article
Behavioural Change
5

Measuring the Impact of Behavioural Design in Security

Part five of a seven-part series unpacking how the behavioural science concept of choice architecture can be woven into IT architecture, UX/UI, and development lifecycles to nudge, guide, and default users toward secure behaviours – without relying solely on training or policy. Each article will blend behavioural science, secure-by-design principles, and practical application in the technology lifecycle.

Read Article
Behavioural Change
4

Making Behavioural Design Part of Engineering

In the first three blogs of this series, we looked at the foundations of choice architecture, the power of secure defaults, and how UX nudges can guide people toward safer decisions. But here’s the challenge: unless these principles are baked into the way we build technology, they risk becoming afterthoughts, nice-to-have features that get dropped when deadlines bite. That’s why the next step is embedding choice architecture into the Software Development Lifecycle (SDLC) itself.

Read Article
Behavioural Change

Harnessing Generative AI for HCRM

This article explores how Gen AI can support HCRM, with a focus on intervention design, and provides 10 validated prompts that practitioners can adapt for their organisation’s specific context.

Read Article
Behavioural Change
3

Nudging Through UX

In the first two blogs of this series, we explored how choice architecture shapes behaviour and why secure defaults are one of the most powerful tools in security. Now it’s time to move into the world of user experience (UX) and interface design, where the smallest details can have the biggest impact on whether people behave securely… or take risky shortcuts.

Read Article
Behavioural Change
2

Designing Secure Defaults That Stick

Part two of a seven-part series unpacking how the behavioural science concept of choice architecture can be woven into IT architecture, UX/UI, and development lifecycles to nudge, guide, and default users toward secure behaviours – without relying solely on training or policy. Each article will blend behavioural science, secure-by-design principles, and practical application in the technology lifecycle.

Read Article
Behavioural Change
1

Choice Architecture Meets IT Architecture

The first of a seven-part series that will unpack how the behavioural science concept of choice architecture can be woven into IT architecture, UX/UI, and development lifecycles to nudge, guide, and default users toward secure behaviours – without relying solely on training or policy. Each article will blend behavioural science, secure-by-design principles, and practical application in the technology lifecycle.

Read Article
Behavioural Change

Unlocking the Power of Influence

In the pursuit of embedding strong cybersecurity practices across an organisation, many professionals have turned to Security Champion Programmes as a key strategy. These programmes leverage employees who are embedded within business units or teams to promote secure behaviours and act as local advocates of cyber risk awareness.

Read Article
Link copied to clipboard!