"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
A Service Set Identifier (SSID) is a series of characters that uniquely names a Wireless Local...
Read moreInput Validation, also known as data validation, is the testing of any input (or data) provided by a...
Read moreBusiness Email Compromise (BEC) is when an email account, often in a company's finance department, is broken into...
Read moreZero Trust is a security strategy focused on the belief that organizations shouldn't automatically...
Read moreThe Ransomware Task Force (RTF) is a group of high-profile security vendors who teamed up with the...
Read moreBluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is...
Read moreThreat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by...
Read moreThreat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.