Insights & human risk resources

Deep dives, data, and practical resources for teams focused on reducing behaviour-driven risk.

Human Risk Intelligence

5 min read

Human Risk Intelligence (HRI): What It Is and Why It Matters

As AI threats and governance pressure grow, Human Risk Intelligence (HRI) offers a smarter way to see risk, prioritize fixes, and prove progress.

Jordan Daly

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Filters

Compliance

5 min read

Navigating GDPR Compliance: A Practical Guide for Organizations

Struggling with GDPR? This practical guide breaks down what’s mandatory, what’s recommended, and what goes above and beyond to help you stay compliant. Learn how to train staff, manage policies, run audits, and build a strong privacy culture that protects both data and trust.

Yu Ling Lok

Company News

5 min read

usecure Secures Series A Investment to Accelerate Global Expansion

usecure has closed a Series A investment with Kennet Partners to scale its human risk management platform globally. Backed by new funding, the company will accelerate product innovation, expand its team, and continue empowering MSPs and IT teams to reduce human cyber risk effectively.

Jordan Daly

Product Updates

5 min read

Why usecure Is the Trusted Choice in Human Risk Management: G2 Summer 2025 Report

usecure’s platform has once again earned top rankings in G2’s Summer 2025 Report, placing strongly across Security Awareness Training and Dark Web Monitoring. With consistent improvements in usability, results, and regional grids, the report highlights why partners and businesses worldwide trust usecure to reduce human cyber risk.

Kerryn Zendera

Threats

5 min read

The 16 Billion Password Leak: What Businesses and Teams Need to Know

A massive breach has exposed over 16 billion usernames and passwords from Apple, Google, Facebook, GitHub and even government platforms. Stolen via infostealer malware, the data is highly “weaponizable,” fueling phishing, account takeovers, and credential stuffing. This blog explains what was leaked, the risks for people and businesses, and the critical steps to reduce exposure and respond early.

Kerryn Zendera

Company News

5 min read

usecure Wins Pax8’s Most Valuable Vendor Award – EMEA

A newly uncovered breach has exposed more than 16 billion usernames and passwords from major platforms like Apple, Google, Facebook, GitHub, and even government services. Stolen via infostealer malware, the data is highly weaponizable — fueling phishing, account takeovers, and credential stuffing. This blog explores the risks for people and businesses, and the steps to reduce exposure.

Hetty Roach

Enablement

5 min read

Why Compliance Leaders Use The Report Hub to Measure Awareness and Reduce Risk

Security and compliance leaders don’t just need awareness training — they need proof it’s working. Report Hub transforms training, phishing, and policy data into clear, audit-ready reports that show measurable progress against frameworks like GDPR, ISO 27001, and NIS2. This blog explores how visibility, defensibility, and people-focused reporting help SMBs, MSPs, and IT teams reduce risk with confidence.

Kerryn Zendera

Enablement

5 min read

Policy Management Isn’t a Compliance Checkbox — It’s a Human Risk Indicator

Policy management isn’t a checkbox, it’s a human risk indicator. Learn why outdated processes fail, how HRM links policies to real behaviour change, and how modern platforms rebuild trust with version control, acknowledgements, and audit-ready evidence.

Kerryn Zendera

Product Updates

5 min read

The New End User Portal Is Now Live

The redesigned End User Portal is now live — faster, mobile-ready, and built to help you complete training, sign policies, and track your risk with ease. With a smarter dashboard, clearer task views, and breach visibility, staying on top of security has never been simpler.

Kerryn Zendera

Compliance

5 min read

Cybersecurity Compliance Standards for the UK Nuclear Energy Sector

A clear guide to UK nuclear cyber compliance: what NISR 2003 (SI 2003/403) requires, how the NCSC CAF assesses cyber resilience, and where ISO 27001:2022 fits. See how ONR enforces standards, why CAF’s 14 principles matter, and how ISO 27001 strengthens assurance across the nuclear supply chain.

Yu Ling Lok