Security Awareness Training Software Resources
Articles, Glossary Terms, Discussions, and Reports to expand your knowledge on Security Awareness Training Software
Resource pages are designed to give you a cross-section of information we have on specific categories. You'll find articles from our experts, feature definitions, discussions from users like you, and reports from industry data.
Security Awareness Training Software Articles
What Is Cross-Site Scripting? How To Prevent XSS Attacks
When we think of cyberattacks, we think about data breaches, viruses, and malware, but have you ever heard of cross-site scripting, aka XSS attacks? Probably not. Even though it’s one of the most notorious and common threats in web applications we use today. So what is it?
by Soundarya Jayaraman
Why Being Just Data Compliant Isn’t Enough
Imagine entering an amusement park that had a fire incident almost a month ago. But since then, the fire department has vetted the amusement park as “safe”. This is also the eighth fire incident in the past year, but there’s nothing to worry about as they are legally compliant with fire standards.
by Amal Joby
2023 Trends in Cybersecurity: Proactive Security Becomes De Facto
This post is part of G2's 2023 digital trends series. Read more about G2’s perspective on digital transformation trends in an introduction from Emily Malis Greathouse, director, market research, and additional coverage on trends identified by G2’s analysts.
by Amal Joby
2021 Trends in Cybersecurity
This post is part of G2's 2021 digital trends series. Read more about G2’s perspective on digital transformation trends in an introduction from Michael Fauscette, G2's chief research officer and Tom Pringle, VP, market research, and additional coverage on trends identified by G2’s analysts.
by Aaron Walker
2021 Trends in Combating Deepfake Impersonation Attacks
This post is part of G2's 2021 digital trends series. Read more about G2’s perspective on digital transformation trends in an introduction from Michael Fauscette, G2's chief research officer and Tom Pringle, VP, market research, and additional coverage on trends identified by G2’s analysts.
by Merry Marwig, CIPP/US
User Adoption is the Key to Calculating ROI for Security Solutions
The return on investment (ROI) is impossible to calculate for cybersecurity solutions. For such solutions, value isn’t found through dollars saved or deals closed; value is found in unobstructed disaster avoidance and a sense of trust for employees, partners, and customers.
by Aaron Walker
Combatting the Rising Threat of COVID-19 Email Scams
The coronavirus has impacted several countries across the world, forcing businesses to adapt to new ways of getting work done. For many businesses, this means supporting a suddenly remote workforce.
by Merry Marwig, CIPP/US
Infographic: How to Secure a Remote Workforce
The COVID-19 pandemic has wreaked havoc across the world, impacting nearly every individual and business. As a result, many companies have shifted their operations to adapt to working remotely, in order to align with social distancing requirements.
by Aaron Walker
COVID-19 Spawns Security Concerns For Rapidly Expanding, Under-Protected Workforce
Worldwide, social distancing has affected the day-to-day activities of nearly every person. In many cases, that means working from home.
by Aaron Walker
How to Strengthen Remote Workforce Security During Crises
The coronavirus health crisis has forced millions of workers (who are able) to transition to working from home. That poses numerous obstacles to workers meeting their deadlines and doing their jobs. Security management and enforcement have become some of the most important and critical transitional needs involved for both workers and their employers.
by Aaron Walker
What Is Fileless Malware and How Do Attacks Occur?
Fileless malware attacks are on the rise as more hackers use it to disguise their nefarious activities. These threats leverage a computer’s existing, whitelisted applications and computing power against itself. This is what security professionals refer to as “live off the land” threats.
by Aaron Walker
Security Awareness Training Software Glossary Terms
Explore our Technology Glossary
Browse through dozens of terms to better understand the products you purchase and use everyday.
Security Awareness Training Software Discussions
0
Question on: Hoxhunt
have you trainings or certificationsI really like to learn about the cyber security, in my professional carrer coul be a good skill and open new jobs
We do not currently offer formal cybersecurity training to users outside of our customer base, but we do release lots of free content that you can use to learn about cybersecurity:
* Threat Feed, a newsletter showcasing ongoing live threats: https://www.hoxhunt.com/threat-feed
* Blog: https://www.hoxhunt.com/blog
* Ebooks: https://www.hoxhunt.com/ebooks-whitepapers
* Webinars: https://www.hoxhunt.com/webinars
* LinkedIn: https://www.linkedin.com/company/10523048
Hope this helps!
0
Question on: KnowBe4 Security Awareness Training
What is KnowBe4 Security Awareness Training used for?What is KnowBe4 Security Awareness Training used for?
Our company uses it to assign training about different security topics like phishing emails. We can track users' completion status and run surveys on how they feel about the trainings
Security Awareness Training Software Reports
Mid-Market Grid® Report for Security Awareness Training
Winter 2025
G2 Report: Grid® Report
Grid® Report for Security Awareness Training
Winter 2025
G2 Report: Grid® Report
Enterprise Grid® Report for Security Awareness Training
Winter 2025
G2 Report: Grid® Report
Momentum Grid® Report for Security Awareness Training
Winter 2025
G2 Report: Momentum Grid® Report
Small-Business Grid® Report for Security Awareness Training
Winter 2025
G2 Report: Grid® Report
Enterprise Grid® Report for Security Awareness Training
Fall 2024
G2 Report: Grid® Report
Small-Business Grid® Report for Security Awareness Training
Fall 2024
G2 Report: Grid® Report
Mid-Market Grid® Report for Security Awareness Training
Fall 2024
G2 Report: Grid® Report
Grid® Report for Security Awareness Training
Fall 2024
G2 Report: Grid® Report
Momentum Grid® Report for Security Awareness Training
Fall 2024
G2 Report: Momentum Grid® Report