Blog > Page 2

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Clear Text

Clear Text

Clear Text (or plaintext) is data that is stored or transmitted without any form of encryption or obfuscation. In...

Read more
Privileged Access Management (PAM)

Privileged Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity framework and set of tools designed to secure, manage, and...

Read more
Identity Management (IDM)

Identity Management (IDM)

Identity Management (IDM) is the framework of policies, processes, and technologies used to ensure the right...

Read more
End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE)

End-to-End Encryption (E2EE) is a method of securing digital communications so that only the sender and the...

Read more
Ad-blockers

Ad-blockers

Ad-blockers are software tools, often installed as browser extensions, apps, or built into browsers, that prevent...

Read more
Operational Disruption

Operational Disruption

Operational Disruption is any unexpected event, failure, or interruption that prevents normal business processes,...

Read more
Microsegmentation

Microsegmentation

Microsegmentation is a security technique that divides a network into smaller, isolated zones down to the...

Read more
Social Engineering 101

Social Engineering 101

Image Source This 2-minute video outlines how social engineers manipulate people in social settings to gain...

Read more
Brushing Scam

Brushing Scam

A brushing scam is a deceptive tactic where online sellers or scammers send unsolicited packages...

Read more
Granular Delegated Admin Privileges (GDAP)

Granular Delegated Admin Privileges (GDAP)

Microsoft's Granular Delegated Admin Privileges (GDAP) is a way of assigning specific...

Read more
Advertising/Data Clean Rooms Protect Consumer Privacy and Build Trust

Advertising/Data Clean Rooms Protect Consumer Privacy and Build Trust

Advertising Clean Room An "advertising clean room", also referred to as a Data Clean Room (DCR), is a term used...

Read more
SASE or Secure Access Service Edge

SASE or Secure Access Service Edge

SASE Secure Access Service Edge (Pronounced: Sassy) SASE is a term coined by Gartner in 2019 to describe an...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer