Blog > Page 11

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Quick Response (QR) Code

Quick Response (QR) Code

A Quick Response (QR) Code is a type of barcode that contains a pattern of dots and lines. It can...

Read more
Zero Trust

Zero Trust

Zero Trust is a security strategy focused on the belief that organizations shouldn't automatically...

Read more
Clickjacking

Clickjacking

Clickjacking, also known as a “UI Redress Attack”, is when an attacker uses multiple transparent or...

Read more
Ransomware Task Force (RTF)

Ransomware Task Force (RTF)

The Ransomware Task Force (RTF) is a group of high-profile security vendors who teamed up with the...

Read more
Bluejacking

Bluejacking

Bluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is...

Read more
Rootkit

Rootkit

A Rootkit is a hacking program or collection of programs that give a threat actor remote access to and control...

Read more
Threat Intelligence

Threat Intelligence

Threat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by...

Read more
Threat Hunting

Threat Hunting

Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find...

Read more
International Traffic in Arms Regulations (ITAR)

International Traffic in Arms Regulations (ITAR)

The International Traffic in Arms Regulations (ITAR) is United States regulation that controls the...

Read more
Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks...

Read more
BYOD

BYOD

BYOD, also known as Bring Your Own Device, is a common practice of allowing employee-owned devices to...

Read more
Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA)

The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada's main...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner