How Agentic AI and Automation Are Changing Cybersecurity

There is no question that AI is changing cybersecurity in a massive way. In many respects, its impact is comparable to the rise of the internet. AI tools are helping organizations improve ...

AI Alone Won’t Stop the Breach: Why Email Security Needs Humans-on-the-Loop

2026 has officially become the year of speed, scale and support. The delta between a phishing email landing and a full organizational compromise has shrunk to mere seconds.

Reducing Phish-Prone Rates Without Training Fatigue: A Practical Playbook for Traditional Organizations

Phishing remains the single biggest human-driven threat in most organizations. Yet many security leaders face a familiar problem: the stronger the push to run frequent training and ...

Redesigning Security Culture for the Agentic Age

The launch of platforms like Moltbook, OpenClaw, and RentAHuman in early 2026 has provided an unsettling glimpse into the future. We are entering a phase of the digital workplace where AI ...

Nobody runs a marathon by accident

Nobody wakes up on a Sunday, stretches, checks the weather, and accidentally clocks 26.2 miles before brunch. A marathon is built on lonely mornings, careful plans, lost toenails, and no ...

Your Password Needs To Be 25 Characters or Longer Due to AI and Quantum Attacks

Prior to my further research into AI and quantum for my latest book, How AI and Quantum Impact Cyber Threats and Defenses, I had pretty solid password policy recommendations:

Why Incident Reporting Beats the Cybersecurity Doppelgänger

It can happen to the best of us. This story happened a decade ago, when I was working at a Fortune 10 company. “Smartest” is subjective, but most of my former coworkers and external ...

The Motor Powering Your Human Risk Management Strategy

Key Takeaways Human Risk Management (HRM) requires intelligent technology to operationalize strategy and drive real risk reduction The HRM+ Platform unifies training, email security, ...

The Hidden Cybersecurity Threat: Securing the Human-AI Relationship

The conversation about AI in cybersecurity is missing the point. While the industry has been focused on the emergence of AI-generated phishing emails, perhaps a far more profound shift ...

Training AI Agents Will Be Status Quo

Protecting humans means protecting the tools humans use.

Psychological Contract Breach and the Power of Security Culture - Research Insights

Employees are expected to behave securely, and the definition of “securely” is often written down in a myriad of security policies. Yet, people do not always comply with security policies ...

Is your Human Risk Management Program Creating Measurable Change? Find Out with Our Free Program Maturity Assessment

In today's threat landscape, your employees represent both your greatest vulnerability and your strongest defense.

What is Human Risk Management?

Cybersecurity has long focused on fortifying networks, securing endpoints and blocking malicious code. Yet one of the most persistent and costly security vulnerabilities isn’t technical — ...

A Clicking Time Bomb: What To Do About Repeat Clickers

I recently had several conversations about repeat clickers. First with a Forrester analyst and then, shortly after, at KB4-CON Orlando following a presentation on the subject by Matthew ...

FTC States That Scams Cost U.S. Consumers $158.3 Billion in One Year

I am used to repeating some pretty big numbers when talking about the financial impact of cybercrimes. When you look into the data, it is pretty easy to start talking about tens of ...

Happy 2nd Birthday to Our KnowBe4 Community!

Can it be? Is it true? Two years of KnowBe4 Community!

Warning: Voice Deepfakes Continue to Improve

AI-generated voice deepfakes present an urgent threat to organizations, according to researchers at Pindrop.

Google Report Outlines the Latest Scam Trends

Researchers at Google have published a report on the latest scam trends, noting an increase in travel-themed scams targeting people preparing for their summer vacations.

Checkups and Checklists: Cyber Risk Isn’t Just a Technical Problem

There are many things in our lives we must prepare for to be ready. For other things, we wing it, or we're not prepared to deal with it at the moment.

How to Recognize Fraudulent North Korean Job Applicants

Researchers at Socure warn of an ongoing wave of employment fraud driven by North Korean IT operatives attempting to secure positions at foreign companies.