HomeIntelligenceBrief
🔓 BREACH BRIEF⚪ Informational📋 Advisory

Book Review Shows Human‑Centric Design Gaps Undermine Security Controls Across Enterprises

Help Net Security reviewed Leron Zinatullin’s *The Psychology of Information Security*, highlighting how security controls often fail when they ignore user behavior. The analysis provides TPRM teams with behavioral frameworks to assess third‑party controls and reduce compliance risk.

🛡️ LiveThreat™ Intelligence · 📅 April 14, 2026· 📰 helpnetsecurity.com
Severity
Informational
📋
Type
Advisory
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
helpnetsecurity.com

Book Review Highlights Human‑Centric Failures in Security Controls

What Happened — Help Net Security reviewed The Psychology of Information Security by Leron Zinatullin, a CISO‑level treatise that argues most security controls break because they ignore the people who must use them. The book blends organizational psychology, change‑management theory, and ISO 27001‑focused case studies to show how mis‑aligned policies create new risk vectors.

Why It Matters for TPRM

  • Human‑behavior flaws can undermine even technically sound third‑party controls.
  • Vendors that overlook usability and motivation may expose clients to compliance gaps and data‑loss risk.
  • The book offers concrete frameworks (COM‑B, Fogg, nudges, boosting) that can be incorporated into third‑party risk assessments.

Who Is Affected — Financial services, SaaS providers, consulting firms, and any organization that relies on third‑party security policies.

Recommended Actions

  • Incorporate behavioral‑risk criteria into vendor questionnaires (e.g., COM‑B capability, opportunity, motivation).
  • Request evidence of usability testing or employee‑feedback loops for critical controls.
  • Align third‑party policy reviews with change‑management best practices (Kotter, Lean Startup).

Technical Notes — The book does not describe a specific vulnerability or exploit; it focuses on the systemic risk of poorly designed controls, citing ISO 27001 malware‑protection controls as examples. Source: Help Net Security Review

📰 Original Source
https://www.helpnetsecurity.com/2026/04/14/review-the-psychology-of-information-security/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.