"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
A Ping of Death (PoD) is a type of Denial of Service (DoS) attack that deliberately sends IP packets...
Read moreCommon Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical...
Read moreReal User Monitoring (RUM) is a form of performance monitoring that captures and analyzes user activity...
Read moreCross-Site Scripting (XSS) is an attack vector where hackers inject malicious code into a vulnerable...
Read moreA Hypervisor, also known as a Virtual Machine Monitor or VMM, is software that creates and manages...
Read moreCross-Site Request Forgery (CSRF), also known as XSRF, is an attack method that fools a web browser...
Read moreThe IETF (Internet Engineering Task Force) is the organization that defines standard Internet operating...
Read moreA Domain Name System (DNS) is essentially the 'phonebook' of the Internet. DNS is an elaborate,...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.