Articles

Articles

Practical advice, expert perspectives, and applied guides on building security culture, managing human risk, and running effective Champions programmes.

Human Psychology 10 Apr 2026 15 min

The Biases That Hack Your People

This is Part 2 of a four-part series. Part 1 introduced dual process theory and the knowledge-behaviour gap. This article maps specific cognitive biases to the attack techniques that exploit them, and examines how the same biases affect security professionals as well as the users they protect. Parts 3 and 4 cover intervention design and measurement.

Read article →
Human Psychology 23 Mar 2026 5 min

Your Users Are Not the Enemy

This is Part 1 of a four-part series on behavioural science for cybersecurity practitioners. It introduces the foundational theory that explains why people behave insecurely despite knowing better, and why the security industry's default response has been so persistently ineffective. Parts 2, 3 and 4 cover cognitive biases, intervention design, and measurement, respectively

Read article →
Behavioural Change 5 Mar 2026 8 min

The Security Champion Effect: How One Person in the Right Place Can Change the Entire Risk Profile of a Team

Somewhere in your organisation, a team’s cyber risk is elevated, not from unpatched systems, but behaviour: how files are shared, credentials handled, and requests judged under pressure. Controls and policy exist, yet culture undermines them. Then one well-placed person joins, and within months reporting rises, people pause before clicking, and leaders flag issues early. No mandates, no new training. That is the Security Champion Effect.

Read article →
Behavioural Change 18 Feb 2026 10 min

Context-Aware Security Reduces Resistance

There is a familiar paradox at the heart of most enterprise security programmes. The harder organisations push to control human behaviour through rigid, uniform controls, the more creatively employees find ways around them. Security teams tighten the perimeter, and a shadow IT ecosystem quietly flourishes just beyond it. This is not a discipline problem. It is a design problem.

Read article →
Multi Agent Systems 2 Feb 2026 15 min

AI agents just built their own social network. Your threat model isn't ready.

Moltbook is making headlines. It looks like Reddit, but AI agents are doing the posting, commenting, and upvoting while humans are mostly just watching. In just four days, it's captured attention because of the sheer novelty: agent-to-agent interaction at scale, complete with playful collective narratives and what look like emergent "belief systems."

Read article →
Research 25 Jan 2026 15 min

The Science of Security Culture Change: How Data-Driven Security Champions Actually Transform Organisations

Research in organisational behaviour consistently demonstrates that strategic positioning of change agents within social networks significantly accelerates behaviour adoption. Studies show that when change agents are positioned at network connection points and among opinion leaders, behaviour spread occurs 2-3 times faster than random distribution. Yet most Security Champions programmes ignore this evidence, recruiting volunteers without considering their network position.

Read article →
Behavioural Change 18 Jan 2026 15 min

From Behaviour to Culture: The Science of Lasting Security Transformation

The cybersecurity industry has spent two decades trying to "change culture" through awareness training, phishing simulations, and policy mandates. The results speak for themselves: human factors remain implicated in over 70% of breaches, and most organisations report little meaningful improvement despite significant investment. The problem isn't effort. It's the sequence.

Read article →

Ready to act on what you have read?

Start your Security Champions programme with CyBehave Heroes.