We wrote the book! Get your free copy of Modern Human Risk Management for Dummies here (pssst, it's for smart people, too!)
RESOURCES

Get the goods

Learn more about human risk management in our resource library.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

Latest

Latest

Blog

2 Min

Here’s our down payment toward delivering phishing on autopilot

Here’s our down payment on phishing nirvana: recurring campaigns. They’re designed for ease of administration and delivery of fresh, risk-targeted tests year-round, minus the manual drudgery.

Blog, Emerging threats

2 Min

Here’s our awkward breach playbook

We break down the Mixpanel breach and attempted extortion tied to Pornhub, highlighting how third-party incidents can quickly turn into human risk. The post includes clear advice for security teams and employees, along with a free, under-2-minute video you can share internally.

Blog

2 Min

Human risk isn’t evenly distributed. The secret’s in cohort analysis.

Human risk varies across roles and behaviors. Cohort-based analysis exposes hidden risk patterns, enabling targeted interventions that reduce exposure more effectively than aggregate metrics alone.

Blog

2 Min

Like MTTR, TTBC is everything

Behavior change alone doesn’t tell the whole story in human risk management. Time-to-behavior change (TTBC) measures how quickly action occurs, revealing how long systems and data remain exposed.

Blog

2 Min

Technical controls or human risk management? Choose belt and suspenders.

Even the best technical controls can’t solve all human risk. From missing controls to misfired ones, human risk interventions make security programs smart, clear, and trustworthy.

Blog

2 Min

How to drive and measure behavior change

Most human risk tools measure training and simulations. It’s important to measure and verify real behavior change by validating outcomes through security telemetry, turning engagement into measurable risk reduction.

Go to page
Go

Eyebrow

Get fresh insights every week.

Vestibulum id ligula porta felis euismod semper.