More than 90% of successful cyberattacks start with email, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). That’s not because security teams lack tools, but because attackers target human decision-making.
![]()
More than 90% of successful cyberattacks start with email, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). That’s not because security teams lack tools, but because attackers target human decision-making.
![]()
As I wrote in my recent book, How AI and Quantum Impacts Cyber Threats and Defenses, as we humans use AI more and more, AI will begin to communicate with itself using new AI-only communication methods that humans cannot easily see or read.
![]()
OSINT stands for open-source intelligence. It is the collection, analysis, and dissemination of information from publicly available sources, such as social media, government reports, newspapers, and other public documents. OSINT is commonly used by intelligence agencies, private investigators, and law enforcement to gather information about an individual or organization. The OSINT framework showcases the multiple ways in which organizations can gather intelligence.
![]()
Most data breaches don’t happen because systems fail. They happen because people make routine errors.
![]()
Fake calendar invites have been a problem on Gmail for years. Even though they could appear on other calendar services, I hadn’t seen or read about a lot of it. Gmail had been taking the brunt of the fake calendar invites.
![]()
Email attacks have become one of the key ways for hackers to target organizations and individuals. The sheer number of tools available has made it easier than ever for non-technical cybercriminals to launch sophisticated cyber attacks. As a result, many resources are available for each stage of the kill chain – from reconnaissance to delivery to weaponization.
![]()
|
“A very timely and important topic. Thank you!” “More people need to take this training!” |
Training Module, Document and Poster |
|
“Short and fast, but simple and effective!”
|
Social Engineering Awareness for Retail |
|
“Awareness is key to stopping fraudulent schemes. I think all workplaces should have this kind of training.” |
Social Engineering Awareness for Construction |
|
Dreaming with AI: Enhancing Software Development with AI Tools |
Hacktive Investigations Series (5 Episodes) |
|
Strong Passwords, Secure Accounts |
|
Business Continuity Basics: What Every Employee Needs to Know |
Cybersecurity Awareness: Digital Defense Essentials |
|
Digital Cleanup Day |
Do Your Part on Digital Clean Up Day |
|
One Report, Shared Protection |
Privacy by Practice: 6 Steps to Protecting Your Digital Identity |
|
Real or Fake? Spotting Deepfakes |
Security Strategies for Help Desk Professionals |
The workplace has evolved, and so has the threat landscape. At KB4-CON 2026, we aren’t just talking about the future. We’re bringing the experts who are currently building it.
We are thrilled to announce that our world-class CISO Advisors will be out in full force this year. Industry veterans like Roger A. Grimes. Perry Carpenter, Javvad Malik, Erich Kron and Martin Kaemer are stepping away from their own command centers to join us in Orlando from May 12–14. They’ll be sharing the raw ‘ground truth’ on how to secure a workforce that now includes both humans and AI agents.
Don’t like to click on redirected links? Copy and paste this into your browser: https://knowbe4.cventevents.com/gB4YnZ?RefId=EmailContentUpdate
NEW! – AIDA Orchestration
We are excited to introduce AIDA Orchestration, the first fully autonomous AI agent for human risk management. It continuously evaluates user risk and automatically delivers the right phishing simulations, training and reinforcement at the right time. Instead of relying on static campaigns and manual decision-making, it transforms your security awareness training program into an always-on system that adapts to user behavior and helps you reduce human risk without adding more work for your team.
AIDA Orchestration operates as the control center for our suite of Artificial Intelligence Defense Agents, making it faster and easier than ever to manage risk. Learn more about AIDA here: https://www.knowbe4.com/products/aida
To see all the features of the KnowBe4 platform, request your demo today!
Don’t like to click on redirected links? Copy and paste this into your browser:
https://info.knowbe4.com/kmsat-request-a-demo-content-update
![]()