We wrote the book! Get your free copy of Modern Human Risk Management for Dummies here (pssst, it's for smart people, too!)
RESOURCES

Get the goods

Learn more about human risk management in our resource library.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

blog

We wrote the book on modern human risk management

Cybersecurity has modernized everywhere except the human layer. This book introduces modern human risk management—data-driven, targeted, and outcome-focused—to finally bring behavior into the security stack.

Latest

Latest

Release notes

< 1 Min

Fable Security product release: September 12, 2025

Target precisely and tie campaigns to outcomes. Here’s what’s new and how to get started.

Webinar

< 1 Min

On-demand webinar: the Fable human behavior data lakehouse

Learn about what enables accurate, explainable, AI-assisted human risk calculation and analysis.

Blog

3 Min

These 7 human risk use cases require a data lakehouse

Seven human risk use cases that are only possible with a flexible data lakehouse architecture.

Release notes

< 1 Min

Fable Security product release: August 29, 2025

Fast insights, smooth workflows, and polish. Here’s what’s new and how to get started.

Fable Security’s data lakehouse architecture showing raw data flowing through Bronze, Silver, and Gold layers toward human risk analysis.

Blog

4 Min

We architected our data lakehouse for insights—and action

Using Medallion’s bronze-silver-gold design ensures data is complete, connected, actionable.

A man traveling speaks on the phone, while chat bubbles display a phishing conversation about a password reset.

Blog

3 Min

Shiny lures, sharp teeth: How to outsmart ShinyHunters

Cybercrime group ShinyHunters exploits trust and urgency to breach orgs. Here’s what you can do.

Go to page
Go

Eyebrow

Get fresh insights every week.

Vestibulum id ligula porta felis euismod semper.