Blog > Page 13

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Mean Time to Failure (MTTF)

Mean Time to Failure (MTTF)

Mean Time to Failure (MTTF) and sometimes references as Mean Time For Failure (MTFF) is the length of...

Read more
Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of...

Read more
Leakware

Leakware

Leakware, also known as Doxware, is a new more potent, and dangerous form of ransomware. When a...

Read more
Packet

Packet

A Packet is the unit of data that is routed between an origin and a destination on the Internet or any...

Read more
Ping of Death (PoD)

Ping of Death (PoD)

A Ping of Death (PoD) is a type of Denial of Service (DoS) attack that deliberately sends IP packets...

Read more
Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool...

Read more
Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical...

Read more
Real User Monitoring (RUM)

Real User Monitoring (RUM)

Real User Monitoring (RUM) is a form of performance monitoring that captures and analyzes user activity...

Read more
Container

Container

Before we get into what a container is, we need you to understand the difference between today's term...

Read more
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable...

Read more
Hypervisor

Hypervisor

A Hypervisor, also known as a Virtual Machine Monitor or VMM, is software that creates and manages...

Read more
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF), also known as XSRF, is an attack method that fools a web browser...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director