19 min

How can we avoid the human being a security weakpoint‪?‬ Technology Now

    • Technology

For the last decade, messaging around cyber security has often followed a similar pattern: Make people fear the consequences of being hacked. We are only human, after all. We’re flawed, and we’re fallible. So are we the weakest link in the cyber security chain? Or is there a better way to look at it?
To answer that, we’re joined this week by HPE Cyber Security Awareness Training Program Manager, Joanne O’Connor.
This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it.
Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA
About the expert: https://www.linkedin.com/in/joanne-oconnor-/?originalSubdomain=ie
Sources and statistics cited in this episode:Psychology of Human error: https://www.tessian.com/research/the-psychology-of-human-error/Survey of most commonly used passwords: https://s1.nordcdn.com/nord/misc/0.78.0/nordpass/top-200-2023/200-most-common-passwords-en.pdfJET Fusion experiment: https://ccfe.ukaea.uk/programmes/joint-european-torus/ITER Fusion lab : https://www.iter.org/proj/inafewlines

For the last decade, messaging around cyber security has often followed a similar pattern: Make people fear the consequences of being hacked. We are only human, after all. We’re flawed, and we’re fallible. So are we the weakest link in the cyber security chain? Or is there a better way to look at it?
To answer that, we’re joined this week by HPE Cyber Security Awareness Training Program Manager, Joanne O’Connor.
This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it.
Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA
About the expert: https://www.linkedin.com/in/joanne-oconnor-/?originalSubdomain=ie
Sources and statistics cited in this episode:Psychology of Human error: https://www.tessian.com/research/the-psychology-of-human-error/Survey of most commonly used passwords: https://s1.nordcdn.com/nord/misc/0.78.0/nordpass/top-200-2023/200-most-common-passwords-en.pdfJET Fusion experiment: https://ccfe.ukaea.uk/programmes/joint-european-torus/ITER Fusion lab : https://www.iter.org/proj/inafewlines

19 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Apple Events (video)
Apple
Apple Events (audio)
Apple
Darknet Diaries
Jack Rhysider
Lex Fridman Podcast
Lex Fridman
TED Radio Hour
NPR