We wrote the book! Get your free copy of Modern Human Risk Management for Dummies here (pssst, it's for smart people, too!)
RESOURCES

Get the goods

Learn more about human risk management in our resource library.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

Latest

Latest

Blog

2 Min

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

eBook

< 1 Min

eBook: Modern Human Risk Management For Dummies

Introducing modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

Blog, Case study

2 Min

From annual training to real impact: Pennymac’s modern approach to security awareness

Pennymac shares how Fable’s AI-driven, role-based training improved engagement, changed behavior, and helped the security team respond faster to real-world risk.

Blog, Case study

2 Min

Genesys security is preparing employees for attacks of tomorrow

Genesis shares how short-form, AI-powered training from Fable increased engagement, improved incident reporting, and helped build a stronger, more effective security culture.

Blog

3 Min

Risk-based targeting isn’t role-based targeting (and the difference matters)

Some human risk vendors mistake role-based for risk-based training. There’s a place for role-based, but real impact comes from responding to observed risk, not assumed risk.

Blog, Emerging threats

4 Min

Beware Microsoft 365 secure authentication requests

Attackers use OAuth device code phishing to bypass passwords and MFA. This post explains how the attack works, why it hurts, and how people can stop it.

Go to page
Go

Eyebrow

Get fresh insights every week.

Vestibulum id ligula porta felis euismod semper.