"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Image Source Tokenization is a way for credit card information (also called the Primary Account Number or...
Read more
Image Source Continuity of Operations Plan (COOP) is a document that sets forth procedures for the...
Read more
Image Source A White Team is a group responsible for refereeing an engagement between a Red Team...
Read more
This video outlines the common WiFi security risks unsuspecting public wifi users are liable to face. This 3 min...
Read more
This video documents what the Wannacry ransomware virus did to companies and individuals throughout the world in...
Read more
This video provides a very good overview of LastPass password manager and its various features from secure...
Read more
This 3 minute video by the Government of Canada outlines how phishing occurs online. Problems online occur when...
Read more
This 3-minute video outlines how to create strong passphrases by using at least five (5) discrete words that are...
Read more
This short 3 min video outlines how to combat malware by preventing it from being installed in the first...
Read more
Image Source It was only about a week ago that the government facility in Pensacola, Florida was...
Read more
Network Segmentation is creating sub-networks within a corporate, enterprise, or another large network....
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
