"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Internet Protocol Security (IPSec) is a set of protocols that provides security for Internet Protocol using...
Read moreA Secure Socket Layer (SSL) is a security protocol developed by Netscape in the 1990's for sending...
Read moreIf you're utilizing Barracuda's Email Security Gateway, you can white-list CyberHoot IP Addresses and Domain Name...
Read moreIf you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in...
Read moreA Reverse Proxy is a server that sits in front of one or more web servers, intercepting requests from...
Read moreA Web Application Firewall (WAF) is used to protect web applications by filtering and...
Read moreStatic Code Analysis is the analysis of software code when the program is not running. The analysis of...
Read moreLast Updated: Sun. March 8th, 2020 The Coronavirus (COVID-19), has infected nearly 90,000 people worldwide as...
Read moreA Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced...
Read moreA Point-to-Point Tunneling Protocol (PTTP) is a networking standard that is used when connecting to a...
Read moreA Drive-By Download is the unintentional download of malicious code to your computer or mobile device...
Read moreSandboxing is a cybersecurity term relating to various techniques used to protect your network and...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.