Think about your digital spaces. Youβve got your corporate email, which we all treat a bit like a high-security bank vault. We approach it with caution, we're suspicious of unfamiliar senders, and weβre primed to spot a dodgy attachment. Then, you have WhatsApp. Thatβs the digital equivalent of your living room. Itβs comfy, familiar, and filled with people you (mostly) trust. Our guard is down.
Normal view
Blurred Chats, Bigger Risks
-
KnowBe4 Security
- UKβs New Cyber Security and Resilience Bill: What Does It Mean For Critical Infrastructure Organisations?
UKβs New Cyber Security and Resilience Bill: What Does It Mean For Critical Infrastructure Organisations?
In recent weeks, the UK government has announced the introduction of its new Cyber Security and Resilience Bill.
The Human-AI Partnership: Securing the New Dual-Front of Business Risk
-
KnowBe4 Security
- The Engine Room: Powering Your Human Risk Management Strategy with Intelligent Tech
The Engine Room: Powering Your Human Risk Management Strategy with Intelligent Tech
Weβve come a long way. Weβve deconstructed the problem, explored the complexity of humans, and laid out a strategic framework and a practical mapβall of which can be explored in more detail in our Human Risk Management (HRM) whitepaper.
The Hidden Cybersecurity Threat: Securing the Human-AI Relationship
The DEEP Matrix: Your Map to a Unified Defense
Welcome back. We have our DEEP framework which was explored in the previous blog post, and discussed in depth in our most recent human risk management (HRM) whitepaper, but a framework is only useful if we can apply it.
The problem is, we don't have "users." We have a complex collection of individuals, each with different motivations, pressures, and levels of security savvy. A one-size-fits-all approach is doomed to fail.
-
KnowBe4 Security
- Why KB4-CON EMEA 2025 Should Be Your Must-Attend Cybersecurity Conference This October
Why KB4-CON EMEA 2025 Should Be Your Must-Attend Cybersecurity Conference This October
Going DEEP: A Simple Framework for a Complex Problem
In our previous blog post, we discussed the behavioral science behind why people click on malicious links.
The Behavioral Science Behind the Click
Welcome back. In our last blog post, we talked about the great divide between tech-focused and people-focused security.