Jen Easterly

Jen Easterly:
Transforming Cybersecurity with Compassion

Introducing our HWH Cybersecurity Icon of the Year! The former director of CISA - she made cybersecurity personal, building a more resilient digital future where people, not just systems, are at the center of protection.

Learn more
Network of People

Ghost Students

They're haunting colleges everywhere. Come to listen to this AI-generated podcast about it.

Learn more
Hacker with no face

Onboarding Cyber Criminals

The resume was great. The references checked out. After four video interviews, they thought they had found the perfect candidate for the job. They didn't realize that they were the job.

Learn more

Want to know more?

Explore and read other posts here.

Deepfakes and Other Attacks

These identity-based, visual attacks have been known for their use in bullying and exploitation, but they're also being used to infiltrate Fortune 100 companies too.

Learn more

View Source, Steal Identity:
HTML Security

Page sources are one of the many tools a hacker loves to use during the reconnaissance stage. Come find out how EASY it is to scrape email addresses off a website to use in an automated password cracking attack.

Learn more