Articles

Dive into practical advice, research findings, and expert perspectives on building security-aware cultures. Explore evidence-based strategies to strengthen your organization's human security posture.

Showing 13-24 of 32 articles
Cyber Behaviour

Behavioural Threat Modelling

Traditional threat models focus heavily on technical vectors, malware payloads, privilege escalation, misconfigurations, and lateral movement. These are critical, but they only paint half the picture. The majority of breaches today begin with a human, a click, a disclosure, a misjudgement, or an omission. If we treat people as static, rational elements in the system, our threat models remain incomplete. It’s time to bring behavioural modelling into the heart of threat assessment.

Read Article
Behavioural Change

Harnessing Generative AI for HCRM

This article explores how Gen AI can support HCRM, with a focus on intervention design, and provides 10 validated prompts that practitioners can adapt for their organisation’s specific context.

Read Article
Human Ai Interaction

Human Cyber Risk in the Age of AI

Human Cyber Risk Management (HCRM) – a discipline that draws on behavioural science to understand why people click, share, trust, or ignore warnings, and how we can shape cultures of secure behaviour. Today, we stand on the edge of something big. Artificial Intelligence is not just another tool in the security stack; it is reshaping the very fabric of how people work, learn, and interact. And with it, the way we must think about human cyber risk.

Read Article
Behavioural Change
3

Nudging Through UX

In the first two blogs of this series, we explored how choice architecture shapes behaviour and why secure defaults are one of the most powerful tools in security. Now it’s time to move into the world of user experience (UX) and interface design, where the smallest details can have the biggest impact on whether people behave securely… or take risky shortcuts.

Read Article
Behavioural Change
2

Designing Secure Defaults That Stick

Part two of a seven-part series unpacking how the behavioural science concept of choice architecture can be woven into IT architecture, UX/UI, and development lifecycles to nudge, guide, and default users toward secure behaviours – without relying solely on training or policy. Each article will blend behavioural science, secure-by-design principles, and practical application in the technology lifecycle.

Read Article
Behavioural Change
1

Choice Architecture Meets IT Architecture

The first of a seven-part series that will unpack how the behavioural science concept of choice architecture can be woven into IT architecture, UX/UI, and development lifecycles to nudge, guide, and default users toward secure behaviours – without relying solely on training or policy. Each article will blend behavioural science, secure-by-design principles, and practical application in the technology lifecycle.

Read Article
Cyber Behaviour

When AI is Misused: The Human Risk We Can’t Ignore

From automating processes to generating insights, AI offers unprecedented opportunities. But alongside this opportunity comes a quieter, less technical challenge: AI misuse by humans inside organisations. When we talk about AI risk, the conversation often fixates on model bias, adversarial attacks, or regulatory compliance. Yet many of the most immediate risks don’t come from the technology itself – they come from the way people choose to use it.

Read Article
Cyber Behaviour

The Rise of Hyper-Personalised Scams

Your face. Your voice. Your words – used against you. In the age of AI, deception just became terrifyingly personal.

Read Article
Human Psychology

When Security Feels Like Surveillance

As cyber threats become more sophisticated, organisations are coming under increasing pressure to monitor employee activity more closely. From detecting insider threats to preventing data leaks, behaviour monitoring has become a standard security policy within many organisations.

Read Article
Human Psychology

The Confidence Trick Never Died – It Just Went Digital

What do con artists from the 1800s and modern-day hackers have in common? More than you think. While the tools have changed, the tactics haven’t. Welcome to the age of digital deception.

Read Article
Cyber Behaviour

Why It’s Time to Kill the Password

We often talk about layered defence, about defending against sophisticated nation-state actors, insider threats, supply chain vulnerabilities, and AI-driven phishing campaigns. But let’s be honest: we’re still losing ground to the simplest exploit vector of all – passwords.

Read Article
Human Ai Interaction

Synthetic Minds and AI Behaviour

This article explores the emerging intersection of synthetic cognition, AI-driven cyber threats, and human behavioural preparedness. The cyber evolution is no longer on the horizon, it is here.

Read Article
Link copied to clipboard!