RESOURCES

Get the goods

Learn more about human risk management in our resource library.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

Latest

Latest

Blog

2 Min

Vanity metrics are lying to you

Vanity metrics hide real exposure. Measuring actual security behaviors—and how fast and how long they change—reveals whether organizations are truly reducing human risk.

Blog

2 Min

Toxic combinations: where human risk multiplies

Toxic risk combinations reveal where human behaviors overlap to amplify exposure, showing security teams exactly where focused remediation delivers the greatest reduction in real-world risk.

Blog

2 Min

Who are your AI swashbucklers?

Analysis of real-world AI usage shows which teams upload sensitive data, what they share, and why visibility into AI usage is now central to managing human risk.

Blog

2 Min

What’s the half-life of a security campaign?

The behavior decay interval shows whether security behavior change lasts, revealing when improvements fade and why relevance, clarity, and ongoing monitoring matter more than one-time wins.

Blog

2 Min

Here’s our down payment toward delivering phishing on autopilot

Here’s our down payment on phishing nirvana: recurring campaigns. They’re designed for ease of administration and delivery of fresh, risk-targeted tests year-round, minus the manual drudgery.

Blog, Emerging threats

2 Min

Here’s our awkward breach playbook

We break down the Mixpanel breach and attempted extortion tied to Pornhub, highlighting how third-party incidents can quickly turn into human risk. The post includes clear advice for security teams and employees, along with a free, under-2-minute video you can share internally.

Go to page
Go

Eyebrow

Get fresh insights every week.

Vestibulum id ligula porta felis euismod semper.