Blog > Page 7

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Threat Hunting

Threat Hunting

Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find...

Read more
International Traffic in Arms Regulations (ITAR)

International Traffic in Arms Regulations (ITAR)

The International Traffic in Arms Regulations (ITAR) is United States regulation that controls the...

Read more
Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks...

Read more
BYOD

BYOD

BYOD, also known as Bring Your Own Device, is a common practice of allowing employee-owned devices to...

Read more
Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA)

The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada's main...

Read more
General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) was passed in the European Union (EU) in 2016 and...

Read more
Data Sanitization

Data Sanitization

Data Sanitization is the process of permanently and irreversibly destroying data on a storage device in...

Read more
Artificial Intelligence (AI)

Artificial Intelligence (AI)

Artificial Intelligence (AI) refers to human-like intelligence presented by a computer, robot, or other...

Read more
Hadoop

Hadoop

Hadoop is a software platform that makes it possible for users to manage large amounts of data....

Read more
User Behavior Analytics (UBA)

User Behavior Analytics (UBA)

User Behavior Analytics (UBA) is the tracking, collecting, and assessment of user data and activities...

Read more
RFC 1918

RFC 1918

RFC 1918, also known as Request for Comment 1918, is the Internet Engineering Task Force (IETF)...

Read more
Non-Fungible Token (NFT)

Non-Fungible Token (NFT)

Non-Fungible Tokens (NFTs) are unique, easily verifiable digital assets that can represent...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner