HowTo: Add a New PDF Policy
This HowTo provides instructions for uploading a PDF policy to CyberHoot to govern your employees. The post HowTo: Add a…
This HowTo provides instructions for uploading a PDF policy to CyberHoot to govern your employees. The post HowTo: Add a…
These steps outline how to assign a training program and the frequency at which the videos are being sent out…
This video helps you create your own unique training program within CyberHoot. The video shows how to set a frequency…
The CEO of Nokia, on the eve of being purchased by Microsoft, said “we didn’t do anything wrong but somehow,…
The cybersecurity industry is in constant flux, driven by escalating threats, emerging technologies, and strategic market maneuvers. This dynamic environment,…
The cybersecurity landscape of 2024 has revealed an unprecedented surge in both the frequency and sophistication of data breaches, setting…
As data protection regulations become more stringent, the DPO (data protection officer) role has become increasingly critical for organisations. In…
Deepfakes are the exciting new thing in cyber security, but at their core they are not a new threat –…
Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a…
Enacted today, the Data (Use and Access) Bill – now the Data (Use and Access) Act 2025 or ‘DUAA’ –…