FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

RSAC 2026 Reveals Why Phishing Still Works

Gregory Zuckerman
Last updated: March 26, 2026 7:23 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

At RSA Conference 2026, the most uncomfortable takeaway wasn’t about malware or misconfigurations. It was about the human brain. In a session that drew a packed room, Randy Rose, vice president for security operations at the Center for Internet Security, argued that phishing continues to succeed because attackers don’t just target systems—they target our decision-making. And too often, we meet them on autopilot.

Why Even Security Experts Still Click on Phishing Emails

Rose anchored his talk in behavioral science. He cited Daniel Kahneman’s model of two thinking modes: the fast, intuitive System 1 and the slower, analytical System 2. We spend most of the day in System 1 because it conserves energy. That’s efficient for life, disastrous for security. Phishing works by hijacking System 1 with urgency, authority, curiosity, or fear—then cashing out before System 2 kicks in.

Table of Contents
  • Why Even Security Experts Still Click on Phishing Emails
  • How AI Is Stripping Away the Old Phishing Red Flags
  • The Numbers Behind Human Risk in Modern Phishing
  • Rethinking Awareness Into Decision Hygiene
  • Stacking Controls To Support Slow Thinking
  • The Mindset Shift Security Needs to Defeat Phishing
A digital representation of a human brain, composed of interconnected blue lines and dots, set against a dark blue background with a network of faint lines and points.

Classic social psychology fills in the rest. Stanley Milgram showed how authority can override judgment. Robert Cialdini identified levers of influence like reciprocity, scarcity, and social proof. Add well-known cognitive biases—anchoring on a single detail, confirmation bias, overconfidence—and you have a predictable architecture of persuasion. Attackers are simply better at using it than we are at resisting it.

The punchline: this isn’t a knowledge gap. It’s a physiology and psychology gap. Even highly trained professionals can be lured into System 1 shortcuts, especially under time pressure, fatigue, or distraction.

How AI Is Stripping Away the Old Phishing Red Flags

For years, awareness programs told users to hunt for typos, odd phrasing, or mismatched logos. That advice is aging out. Generative AI now crafts fluent, brand-perfect messages at scale, localizes tone, and tailors pretexts using open-source intelligence. Deepfake audio and video add high-fidelity pressure—think a “CFO” on a video call greenlighting a transfer. In one widely reported case, a finance worker was persuaded via deepfake colleagues to move funds totaling tens of millions.

Meanwhile, infrastructure looks cleaner too. Attackers use compromised but reputable domains, valid certificates, and MFA-bypassing kits. The old telltales are evaporating, which is exactly Rose’s point: training users to spot artifacts is a losing game when the artifacts are disappearing.

The Numbers Behind Human Risk in Modern Phishing

The data backs the human story. The latest Verizon Data Breach Investigations Report attributes roughly 68% of breaches to the “human element,” including phishing and social engineering. Proofpoint’s State of the Phish has repeatedly found that a majority of organizations face at least one successful phishing incident each year. The FBI’s Internet Crime Complaint Center continues to list phishing as the top reported cybercrime by volume, while business email compromise remains the costliest, with losses in the billions.

RSAC conference: why phishing still works through email lures and social engineering

Real-world breaches echo the theme. Help desk social engineering has enabled intrusions at major brands, MFA fatigue has felled tech giants, and vendor email compromise has rerouted legitimate payments. None of these required zero-days—only zero hesitation.

Rethinking Awareness Into Decision Hygiene

Rose’s critique of security training is blunt: too noisy, too artifact-focused, and not grounded in how humans actually decide. His prescription is to create “decision hygiene” that interrupts System 1 and invites System 2. Three practical moves stand out.

  1. First, institutionalize the pause. Build micro-delays into sensitive workflows—supplier changes, payment approvals, credential resets—so employees have permission to slow down. A 60-second rule and a short checklist (What is the request? What’s the rush? How can I verify in another channel?) changes outcomes.
  2. Second, require channel switching for high-risk actions. Out-of-band verification via a known phone number or internal ticket, not a reply to the same email thread, defeats many near-perfect spoofs. This counters authority and urgency triggers in one move.
  3. Third, train the “why,” not just the “what.” Teach common influence techniques and cognitive biases with concrete scenarios, then rehearse responses. Reflection exercises, post-incident reviews that analyze thinking (not blame), and team walk-throughs help employees recognize when they’re being steered.

Stacking Controls To Support Slow Thinking

Behavioral defenses work best when technology and process create the right friction. Phishing-resistant MFA such as FIDO2 passkeys reduces credential theft value. Conditional access and impossible-travel policies blunt token replay. DMARC enforcement, brand indicators, and removing external auto-forwarding shrink spoofing surface area. For high-risk roles, browser isolation or link detonation adds a safety net.

On the process side, set hard guardrails: no payment or banking changes without out-of-band confirmation; no emergency access granted without secondary identity proof; no password resets initiated solely from email. Help desks need scripts that assume adversarial pretexts and verify identity with signals attackers can’t easily fake.

The Mindset Shift Security Needs to Defeat Phishing

The uncomfortable truth from RSAC 2026 is that phishing still works because it exploits normal brains doing normal things under normal pressure. The fix isn’t shaming users or piling on more red flags. It’s redesigning decisions so System 2 shows up in the moments that matter, supported by controls that make the secure choice the easy default.

Phishers are optimizing for our attention, energy, and habits. Security leaders should do the same—by budgeting time to think, rewarding skepticism, and engineering workflows that favor verification over velocity. Slow is smooth, smooth is secure.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
How Faceless Video Is Transforming Digital Storytelling
Oracle Cloud ERP Outage Sparks Renewed Debate Over Vendor Lock-In Risks
Why Digital Privacy Has Become a Mainstream Concern for Everyday Users
The Business Case For A Single API Connection In Digital Entertainment
Why Skins and Custom Servers Make Minecraft Bedrock Feel More Alive
Why Server Quality Matters More Than You Think in Minecraft
Smart Protection for Modern Vehicles: A Guide to Extended Warranty Coverage
Making Divorce Easier with the Right Legal Support
What to Know Before Buying New Glasses
8 Key Features to Look for in a Modern Payroll Platform
How to Refinance a Motorcycle Loan
GDC 2026: AviaGames Driving Innovation in Skill-Based Mobile Gaming
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.