Blog > Page 64

Stay sharp with security insights

Application Fuzzing

Application Fuzzing

Application Fuzzing, originally developed by Barton Miller at the University of Wisconsin in...

Read more
Application Proxy

Application Proxy

An Application Proxy is one of the most secure firewall types that can be deployed. The...

Read more
Application Security Assessment

Application Security Assessment

An Application Security Assessment is performed either manually or automatically, generally...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Dwell Time

Dwell Time

Dwell Time is the amount of time threat actors go undetected in an environment. In other words, when a...

Read more
CyberHoot Newsletter – Volume 4

CyberHoot Newsletter – Volume 4

Feature Story: Coronavirus 2019 (COVID19) Advisory The Coronavirus (COVID-19), has now infected nearly...

Read more
97% Top International Airports Fail Cybersecurity Test

97% Top International Airports Fail Cybersecurity Test

A few weeks ago a report was published by a cybersecurity firm, ImmuniWeb. This report revealed that...

Read more
Trello Exposes Personally Identifiable Information

Trello Exposes Personally Identifiable Information

Trello, the platform used by many businesses for organizing to-do lists and coordinating team tasks has...

Read more
Internet Protocol Security (IPSec)

Internet Protocol Security (IPSec)

Internet Protocol Security (IPSec) is a set of protocols that provides security for Internet Protocol using...

Read more
Secure Socket Layer (SSL)

Secure Socket Layer (SSL)

A Secure Socket Layer (SSL) is a security protocol developed by Netscape in the 1990's for sending...

Read more
HowTo: Allow-List CyberHoot – Personal Gmail Account

HowTo: Allow-List CyberHoot – Personal Gmail Account

If you sign up to receive CyberHoot BootCamp as an individual, you may need to allow-list the CyberHoot Domain in...

Read more
Reverse Proxy

Reverse Proxy

A Reverse Proxy is a server that sits in front of one or more web servers, intercepting requests from...

Read more
Web Application Firewall (WAF)

Web Application Firewall (WAF)

A Web Application Firewall (WAF) is used to protect web applications by filtering and...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory