Blog > Page 11

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
RFC 1918

RFC 1918

RFC 1918, also known as Request for Comment 1918, is the Internet Engineering Task Force (IETF)...

Read more
Bogon

Bogon

A Bogon is an IP address (IPv4 or IPv6) that has yet to be officially assigned for use by the Internet...

Read more
Non-Fungible Token (NFT)

Non-Fungible Token (NFT)

Non-Fungible Tokens (NFTs) are unique, easily verifiable digital assets that can represent...

Read more
Jailbreaking

Jailbreaking

Jailbreaking is the exploiting of manufacturer or carrier operating systems, often by removing...

Read more
Mean Time to Failure (MTTF)

Mean Time to Failure (MTTF)

Mean Time to Failure (MTTF) and sometimes references as Mean Time For Failure (MTFF) is the length of...

Read more
Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a strategy of limiting network access based on the roles of...

Read more
Leakware

Leakware

Leakware, also known as Doxware, is a new more potent, and dangerous form of ransomware. When a...

Read more
Packet

Packet

A Packet is the unit of data that is routed between an origin and a destination on the Internet or any...

Read more
Ping of Death (PoD)

Ping of Death (PoD)

A Ping of Death (PoD) is a type of Denial of Service (DoS) attack that deliberately sends IP packets...

Read more
Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM)

Synthetic Transaction Monitoring (STM), also known as Synthetic Monitoring, is a web monitoring tool...

Read more
Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director