Resources

Stay updated

As security professionals we love to share our knowledge and expertise. Consume it the way you like best: read our blogs, listen to our podcast or watch our videos. We have it all. Please note: all content is regarding the role of human behaviour in cybersecurity.
Young man reads content on a tablet.
(Integer: 1922)
Blog
Cybersecurity predictions: 2025 and beyond

Cybersecurity predictions: 2025 and beyond

Security awareness has become critical, with organizations focusing on fostering a culture of security beyond traditional training. Don’t miss strategies to stay ahead in 2025 and beyond.

Rudy Spinola
Rudy Spinola Auteur
(Integer: 1920)
Blog
Redefining security awareness: The persona based approach

Redefining security awareness: The persona based approach

Security awareness programs often fail to engage because they don't address the diverse roles and risks within an organization. This blog advocates for a persona-based approach, which raises the effectiveness of cybersecurity training.

Rudy Spinola
Rudy Spinola Auteur
(Integer: 1920)
Blog
Navigating the challenges of cybersecurity leadership

Navigating the challenges of cybersecurity leadership

In a budget-tight environment, CISOs must innovate and advocate for effective cybersecurity strategies. This blog outlines how CISOs can transform cybersecurity from a cost center to a business enabler.

Rudy Spinola
Rudy Spinola Auteur
(Integer: 1920)
Blog
What the hack at Scandinavian Airlines teaches us

What the hack at Scandinavian Airlines teaches us

Scandinavian Airlines (SAS) was the victim of a cyber attack in 2023. The motive behind the attack and the actions SAS took contain important lessons.

Melvin Broersma
Melvin Broersma Auteur
(Integer: 1920)
Blog
Breaking the Cyber kill Chain

Breaking the Cyber kill Chain

How can employees help break the Cyber Kill Chain? To answer that question, you first need to understand how each stage of the Cyber Kill Chain works.

Melvin Broersma
Melvin Broersma Auteur
(Integer: 1920)
Blog
How tun run a crisis simulation in five simple steps

How tun run a crisis simulation in five simple steps

Find out why you should start running crisis simulations for better and faster responses to cyber incidents.

Nordin van den Hoogen
Nordin van den Hoogen Auteur