Blog > Page 2

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Clear Text

Clear Text

Clear Text (or plaintext) is data that is stored or transmitted without any form of encryption or obfuscation. In...

Read more
Privileged Access Management (PAM)

Privileged Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity framework and set of tools designed to secure, manage, and...

Read more
Identity Management (IDM)

Identity Management (IDM)

Identity Management (IDM) is the framework of policies, processes, and technologies used to ensure the right...

Read more
End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE) is a method of securing digital communications so that only the sender and the...

Read more
Ad-blockers

Ad-blockers

Ad-blockers are software tools, often installed as browser extensions, apps, or built into browsers, that prevent...

Read more
Operational Disruption

Operational Disruption

Operational Disruption is any unexpected event, failure, or interruption that prevents normal business processes,...

Read more
Microsegmentation

Microsegmentation

Microsegmentation is a security technique that divides a network into smaller, isolated zones down to the...

Read more
Social Engineering 101

Social Engineering 101

Image Source This 2-minute video outlines how social engineers manipulate people in social settings to gain...

Read more
Brushing Scam

Brushing Scam

A brushing scam is a deceptive tactic where online sellers or scammers send unsolicited packages...

Read more
Granular Delegated Admin Privileges (GDAP)

Granular Delegated Admin Privileges (GDAP)

Microsoft's Granular Delegated Admin Privileges (GDAP) is a way of assigning specific...

Read more
Advertising/Data Clean Rooms Protect Consumer Privacy and Build Trust

Advertising/Data Clean Rooms Protect Consumer Privacy and Build Trust

Advertising Clean Room An "advertising clean room", also referred to as a Data Clean Room (DCR), is a term used...

Read more
SASE or Secure Access Service Edge

SASE or Secure Access Service Edge

SASE Secure Access Service Edge (Pronounced: Sassy) SASE is a term coined by Gartner in 2019 to describe an...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory