Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

Stu Sjouwerman

Chief Executive Officer & President

Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4, Inc., which hosts the world’s most popular integrated security awareness training and simulated phishing platform, with over 54,000 organization customers and more than 50 million users. A serial entrepreneur and data security expert with 30 years in the IT industry, Stu was the co-founder of Inc. 500 company Sunbelt Software, a multiple award-winning anti-malware software company that was acquired in 2010.


Recent Posts

Scam Of The Week: "Held For Ransom"

You should alert your users that a particularly effective scam is growing by leaps and bounds recently. It's not new, but it's bursting into mainline cybercrime these last few weeks. The ...
Continue Reading

Watching Porn on a Mobile …Risky?

The Internet has its own Red Light District, and it is one of the most unsafe areas you can browse. Online porn is a profitable sideline for the adult industry, but a mainline business ...
Continue Reading

CyberheistNews Vol 3, 32

CyberheistNews Vol 3, # 32
Continue Reading

Debate: Security Training Effective? What's Your Opinion...

In the August issue of SC Magazine yours truly is one of the two experts that discuss whether security training is an effective strategy in the workplace. My counterpart is Dave Aitel, ...
Continue Reading

Liberty and Security - it's not an either/or choice

My good friend Mac Graham just sent me this article that I think is thoughtful, balanced and provides a very interesting solution for this "Liberty versus Security" problem. (Full ...
Continue Reading

U.S. Commercial Banking In Top 10 Riskiest Industries.

Mark Holan at the Tampa Bay Business Journal reported on something remarkable. Commercial Banks are in the #6 slot of the Top 10 Riskiest industries in the U.S. (!) "Industry research ...
Continue Reading

CyberheistNews Vol 3, # 31

CyberheistNews Vol 3, # 31
Continue Reading

Scam Of The Week: Christian Singles

Continue Reading

CyberheistNews Vol 3, 30

CyberheistNews Vol 3, # 30
Continue Reading

NSA Surveillance: IT Pro Survey Says What?

Continue Reading

Employees the Weakest Link of Cyber Security, Report Finds

Antivirus company Bitdefender reported something important. Here is their blog post of July 17, 2003.
Continue Reading

LLoyds: Cyber Risk Rises from 12th to 3rd place In Three Years

You all know the world famous insurance company LLoyds. What you may not know is that they maintain a list of Top Risks. It's called their Risk Index and it's the result of a survey of ...
Continue Reading

Congressional Aides Targeted By Spear-phishing Attacks

Reuters just reported that Congressional aides in the Senate and House of Representatives said on Thursday that they were notified of a potential security risk involving email and other ...
Continue Reading

Why help desk employees are a social engineer's favorite target

Steve Rangan over at the The CSO site wrote:
Continue Reading

The One Security Technology That Actually Works: Application Control

July 16, 2013, Roger Grimes wrote an article in InfoWorld that was straight out of my mind. He said: "Antivirus, perimeter defense, and network monitoring are jokes. But whitelisting ...
Continue Reading

CyberheistNews Vol 3, # 29

CyberheistNews Vol 3, # 29
Continue Reading

Phishing Attack: Your Twitter friend may not really be your friend

There is a new phishing campaign doing the rounds trying to get your Twitter login credentials. The scam arrives as a direct messages to prospective victims from one of their contacts. ...
Continue Reading

7 reasons for security awareness failure

Ira Winkler and Samantha Manke just wrote a great article at the CSO site about why security awareness programs fail. They started out with: "There is a great dichotomy in Security ...
Continue Reading

CyberheistNews Vol 3, 28

CyberheistNews Vol 3, # 28
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews