top of page


Patching with Tech: Why Does It Fail to Fully Secure Business Cyber Systems?
To Patch or Not to Patch and to Patch with What? - That Is a Question “Patching with technology”, to date, represents the most widespread...
Ganna Pogrebna
Nov 29, 20226 min read
10 views
0 comments


Why Do Businesses Pay Ransoms to Cyber Criminals? Irrationality and Compliance versus Common
The Story of One Hotel and Four Ransoms There is a small 4-star hotel in Austrian Alps called Seehotel Jägerwirt. On the one hand, there...
Ganna Pogrebna
Nov 29, 20224 min read
7 views
0 comments


Cyber Security and Mental Health: What Is the Connection?
What is the relation between cyber security and mental health? You probably think that there is no connection. But don't be too quick...
Ganna Pogrebna
Nov 29, 20223 min read
8 views
0 comments


Algorithmic Manipulation: How We Lost the Ability to Switch Off and Reflect
On Human versus Algorithmic Decision Making Contemporary decision making implies close interaction between humans and algorithms. Think...
Ganna Pogrebna
Nov 13, 20205 min read
107 views
0 comments


Five Major Behavioural Misconceptions about Cybersecurity
We often ask - why is it that cybercriminals succeed despite constant attempts to design better cybersecurity tools? The answer is simple...
Ganna Pogrebna
Sep 19, 20204 min read
29 views
0 comments


Privacy as an Unfair Advantage: 3 Reasons to Pay Attention to the Recent iPhone Commercial
Only a lazy person did not repost the new iPhone ad released by Apple on September 3, 2020. The ad makes a big bold statement about...
Ganna Pogrebna
Sep 4, 20204 min read
13 views
0 comments


Cyber "Street Cred": Verifiability and Responsibility of Data Processing in Cybersecurity
"Street Cred - commanding a level of respect in particular environments due to experience in or knowledge of issues affecting those...
Ganna Pogrebna
Aug 29, 20206 min read
16 views
0 comments


How to Build Self-Healing Cybersecurity Systems
Much of the current cybersecurity efforts in organizations is concentrated around building robustness rather than resilience. The root of...
Ganna Pogrebna
Aug 22, 20205 min read
198 views
0 comments


Do You Have It In You? The Anatomy of Human Cybersecurity Sensors
In recent years many organisations came to the conclusion that the detection of new cybersecurity risks heavily relies on the ability of...
Ganna Pogrebna
Aug 13, 20205 min read
125 views
0 comments


An Earthquake in a Jar: Cybersecurity of Connected Things
A computer chip represents a basic level of digital technology. Chips are used in many areas of human life, but the nature of a chip is...
Ganna Pogrebna
Aug 8, 20208 min read
11 views
0 comments


Over Saturated, Dense, Context-dependent: Cybersecurity and The Market for Personal Data
The development of information and communication technology in the modern economy has created opportunities for businesses to provide...
Ganna Pogrebna
Jul 31, 20208 min read
38 views
0 comments


The Psychology of "Safe", "Secure" and "Private" in Cyber Spaces
In cybersecurity, we often talk about safety, security, and privacy. Yet, not only we do not fully understand what these terms mean and...
Ganna Pogrebna
Jul 23, 20205 min read
58 views
0 comments


Why Cyberattacks on Critical Infrastructure Are Now More Dangerous than Ever
If You Can Make It, Cyber Can Break It With the rise of smart systems, which interfere with many aspects of business, cybersecurity...
Ganna Pogrebna
Jul 14, 20205 min read
24 views
0 comments


Should We Use AI and Machine Decision Making in Cybersecurity?
The field of cybersecurity is increasingly working together with other fields, including, for example, ML automation, the legal...
Ganna Pogrebna
Jul 9, 20206 min read
21 views
0 comments


Is the Trade-off between Information Sharing and Cybersecurity Real?
Why the Current Cyber Attacks in Australia highlight the Global Information Sharing Crisis in Cybersecurity On June 19, 2020, the...
Ganna Pogrebna
Jun 24, 20205 min read
14 views
0 comments


How deceptive is deception? Thoughts on decoy distribution…
first published on LinkedIn on April 27, 2019 TL;DR: Things are not always you may desperately want them to be ¯\_(ツ)_/¯ #Deception in...
taratine
Jun 18, 20206 min read
41 views
0 comments


Cyber Security Statistics: Where Does It Come From and Can It be Trusted?
Many different blogs, posts, and even industrial reports quote statistics on cybersecurity. What is the most "dangerous" cyber threat?...
Ganna Pogrebna
Jun 12, 20204 min read
31 views
0 comments


Diversity and Inclusivity in Cyber Security: The Case of Technology and People
Like many systems and aspects of our life, cyber security often suffers from the lack of diversity and inclusivity. This concerns both...
Ganna Pogrebna
Jun 10, 20206 min read
305 views
0 comments


Cyber Security of FinTech Part 3: Technology Challenges
In the previous posts on cyber security of FinTech, we identified 4 main categories of challenges which are faced by the FinTech...
Ganna Pogrebna
Jun 2, 20204 min read
14 views
0 comments


Why Is It Important to Quantify the Consequences of Potential Cyber Attacks?
Many businesses are struggling with cyber security defence, because it is hard to quantify potential harm from cyber attacks....
Ganna Pogrebna
May 27, 20204 min read
81 views
0 comments
bottom of page