Blog

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
hCaptcha

hCaptcha

hCaptcha is a bot mitigation and anti-spam service that helps websites distinguish between real human users and...

Read more
Quishing

Quishing

Quishing is a type of phishing attack that targets users via QR codes. Attackers create malicious QR codes that,...

Read more
Malvertising

Malvertising

Malvertising is short for malicious advertising. It refers to the use of online ads to deliver malware to...

Read more
Privacy-Enhancing Computation (PEC)

Privacy-Enhancing Computation (PEC)

Privacy-Enhancing Computation (PEC) refers to a set of technologies and methods that allow organizations to...

Read more
Clear Text

Clear Text

Clear Text (or plaintext) is data that is stored or transmitted without any form of encryption or obfuscation. In...

Read more
Privileged Access Management (PAM)

Privileged Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity framework and set of tools designed to secure, manage, and...

Read more
Identity Management (IDM)

Identity Management (IDM)

Identity Management (IDM) is the framework of policies, processes, and technologies used to ensure the right...

Read more
End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE) is a method of securing digital communications so that only the sender and the...

Read more
Ad-blockers

Ad-blockers

Ad-blockers are software tools, often installed as browser extensions, apps, or built into browsers, that prevent...

Read more
Operational Disruption

Operational Disruption

Operational Disruption is any unexpected event, failure, or interruption that prevents normal business processes,...

Read more
Microsegmentation

Microsegmentation

Microsegmentation is a security technique that divides a network into smaller, isolated zones down to the...

Read more
Social Engineering 101

Social Engineering 101

Image Source This 2-minute video outlines how social engineers manipulate people in social settings to gain...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer