RESOURCES

Get the goods

Learn more about human risk management in our resource library.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

blog

Emerging threat: Permit lures victims with new invoice fraud scheme

Attackers are using public permit data to send fake fee invoices from lookalike domains. Learn how employees can spot and stop the scam.

Latest

Latest

Blog

2 Min

The 10 most common human risks

Security teams encounter recurring human risks across organizations. From weak credentials to data exposure, understanding these behaviors—and delivering targeted, timely interventions—significantly improves overall security posture.

Blog

4 Min

The art (and science) of behavior change in human risk.

See how organizations measure and reduce human risk, showing why targeted interventions outperform broad campaigns, how behavior change, toxic combinations, and real metrics reshape security strategy.

Report

< 1 Min

The infographic: The art (and science) of behavior change in human risk

Data and graphics from our report on how organizations measure and reduce human risk.

Report

< 1 Min

The report: The art (and science) of behavior change in human risk

Our report on how organizations measure and reduce human risk.

Blog

3 Min

Hackers have learned to whisper to AI. It’s working.

Attackers are now exploiting AI’s ability to read, interpret, and act. Hidden prompts, images, and tool manipulation are in the offing. Take remediative action and arm your people to recognize these threats.

Blog, Emerging threats

2 Min

How a fake ChatGPT installer tried to steal my password

Our product manager tried to install ChatGPT Atlas and found password-stealing malware. Here’s how it all went down. (We’ve also included a free, downloadable briefing video.)

Go to page
Go

Eyebrow

Get fresh insights every week.

Vestibulum id ligula porta felis euismod semper.