Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.

AI

Modern Human Risk Management Programs: Beyond Awareness Training for an AI Enabled Future

For years, “managing human risk” usually meant:train people once a year, run phishing simulations, track click rates, repeat.

1 min read

How AI and Cyber Culture Collide: Human Risk in the Age of GenAI

GenAI showed up in most organizations the way shadow IT did: not with a carefully planned rollout, but with a link in a chat.

7 min read

What Is Cognitive Operations? The Human Competency for Safe AI

We’ve spent years building IT operations, security operations and now AI operations. But there’s a missing layer: the operational capability that...

1 min read

What is AI Risk Culture?

You can buy AI tools. You can stand up models. You can write policies. None of that guarantees that AI will be used safely or wisely in real work.

1 min read

What is the Cognitive Attack Surface?

You already know about attack surfaces in the traditional sense: networks, applications, endpoints, cloud services. But there’s another surface that...

1 min read

What are Analog Security Firebreaks? Examples and Use Cases

Introduction: Why Analog Still Matters in a Deepfake World The digital world is accelerating, automating, and—alarmingly—faking its way into every...

2 min read

Behavioral Defense: Teaching Teams to Disrupt Adversaries, Not Just Detect Them

There’s a scene that plays out too often inside security operations centers. An alert pings, a dashboard flares red, and the team moves...

3 min read

Cybermaniacs CEO Featured on The Professional CISO Show to Reframe Human Risk, Culture & Resilience

In the latest episode of The Professional CISO Show, host David Malicoat sits down with Kathryn Brett Goldman, CEO & Founder of Cybermaniacs, for a...

4 min read

What is the Cyber Attack Chain and How Behavior Can Break It

The Modern Attack Chain Isn’t Just Technical—It’s Human We’ve spent decades teaching users to spot suspicious links and IT teams to hunt for malware,...

2 min read