Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Google Assisting in Personally Identifiable Information Removal

Google Assisting in Personally Identifiable Information Removal

Secure your business with CyberHoot Today!!! Sign Up Now In late April 2022, Google announced they've...

Read more
Privacy Regulations – Day 24 of Cybersecurity Awareness Month

Privacy Regulations – Day 24 of Cybersecurity Awareness Month

Today is Day 24 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Twitter Steganography Risks

Twitter Steganography Risks

Steganography is the interesting but potentially dangerous technique of hiding data or malware code...

Read more
Non-Fungible Token (NFT)

Non-Fungible Token (NFT)

Non-Fungible Tokens (NFTs) are unique, easily verifiable digital assets that can represent...

Read more
Apple’s New Privacy Initiative

Apple’s New Privacy Initiative

Apple’s tracking-optional iOS 14.5 update provides privacy-preserving features, giving users the...

Read more
Canada Rules Clearview AI’s Illegal

Canada Rules Clearview AI’s Illegal

Clearview AI has created one of the broadest and most powerful facial recognition databases in the...

Read more
Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE)

Common Vulnerabilities and Exposures (CVE) is a list of computer security flaws ranked on critical...

Read more
Data Aggregation

Data Aggregation

Data Aggregation is any process where data is gathered and expressed in a summary form. Data...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
Regulations Like the CCPA Don't Stop at California

Regulations Like the CCPA Don't Stop at California

Following the General Data Protection Regulation (GDPR) enactment in the European Union (EU) in 2018,...

Read more
Clearview AI’s Groundbreaking Facial Recognition

Clearview AI’s Groundbreaking Facial Recognition

Clearview AI has created one of the broadest and most powerful facial recognition databases in the...

Read more
Need to Know

Need to Know

Need to Know is a term that applies to sensitive and often classified information. It is a...

Read more
Testimonials

See who's talking about Cyberhoot

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator