Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.

Culture (2)

Culture Isn’t a Mug: Cyber Security Culture as a System, Not a Slogan

“Culture” might be the most misunderstood word in cyber security.

6 min read

Measuring Cyber Security Culture: NCSC-Aligned Metrics That Actually Work

It's been a long time coming in cybersecurity, but I think we can safely say that everyone (finally!) agrees that culture matters. What we've found...

7 min read

How to Build a 12-Month NCSC Cyber Security Culture Roadmap

Ok. Here's where we are. You’ve read the NCSC cyber security culture guidance. You’ve nodded along with the six principles. You might even have a few...

9 min read

Where Cyber Security Culture Goes Wrong: NCSC Warning Signs in Real Organizations

If you read the NCSC’s cyber security culture guidance, it’s full of positive end-states:

7 min read

How to Operationalize the NCSC Cyber Security Culture Principles (Step-by-Step)

Reading the NCSC’s cyber security culture guidance is one thing. Getting it off the PDF and into the messy reality of projects, people, and politics...

8 min read

NCSC Cyber Security Culture Principles: What They Are and Why They Matter

If your cyber security “culture” lives mostly on a mug, a hoodie and an annual e-learning course… it’s not culture. It’s merchandising.

8 min read

Reducing Cognitive Debt in Cybersecurity: How Leaders Can Design Simpler, Safer Systems

A mid-sized Connecticut company lost $5.4 million in a business email compromise (BEC) scam after its finance team executed a wire transfer to what...

3 min read

What is Cognitive Overload in Cybersecurity?

Cognitive overload isn’t a personal failing. It’s a design flaw. And in cybersecurity, it’s fast becoming one of the most exploitable weaknesses in...

3 min read

From Partner to Predator: When Employees “Collaborate” with AI Outside Controls

TL;DR — Your employees’ “AI assistant” might be your next silent threat. As generative AI tools become embedded in daily work, many employees adopt...

4 min read

How AI is Changing Cybersecurity Threats

Artificial Intelligence is not a future threat. It’s a present accelerant. From phishing emails that mimic your CEO’s tone to malicious code written...

4 min read