
Cybersecurity Awareness Training and FERPA: Securing Student Records Through Education
The Family Educational Rights and...

How Cybersecurity Awareness Training Supports the NIST Cybersecurity Framework
The NIST Cybersecurity Framework (CSF)...

Cybersecurity Awareness Training for CCPA / CPRA Compliance: Empowering Employees to Protect Consumer Privacy
The California Consumer Privacy Act...

PCI-DSS and Cybersecurity Awareness Training: Protecting Cardholder Data from Human Risk
The Payment Card Industry Data Security...

HIPAA Compliance and Cybersecurity Awareness: Training for Healthcare Data Protection
The Health Insurance Portability and...

Cybersecurity Awareness Training and NIS2 Compliance: Securing the Human Layer in Critical Sectors
The NIS2 Directive (Directive (EU)...

Cybersecurity Awareness Training for DORA Compliance: Managing Human Risk in Financial Services
The Digital Operational Resilience Act...

Cybersecurity Awareness Training and ISO 27001: A Practical Compliance Guide
ISO/IEC 27001 is one of the most widely...

Meeting SOC 2 Type II Requirements with Cybersecurity Awareness Training
SOC 2 Type II has become the gold...

How Cybersecurity Awareness Training Supports GDPR Compliance
Since the introduction of the General...

Modern Phishing Detection: Why It’s So Hard and How to Get Better at It
Modern phishing detection is...

MFA Fatigue: The Growing Threat Undermining Multi-Factor Authentication
Multi-factor authentication (MFA) was...

How Clone Phishing Threatens Your Compliance (GDPR, HIPAA & More)
One often overlooked but incredibly...










How to Run a Simulated Vishing Attack? Our complete guide.
"How would your team respond to a voice...

Bypassing Multi Factor Authentication (MFA) with a callbot
Call bots, a kind of vishing automation...


How to launch a phishing simulation to better protect your company?
In this post, we'll explore the key...

How Klaxoon uses Arsen to train its employees against phishing attacks
Aymeric from Klaxoon explains why they...











