Haiku, Inc

Haiku, Inc

Computer and Network Security

Henderson, NV 6,522 followers

We create "serious games" that train learners in hands-on cybersecurity skills and connect them to jobs.

About us

Haiku Inc has revolutionized cyber security training for anyone by using game-based training to teach hands-on, real-world cybersecurity skills that can lead to a lucrative career. Our product suite includes two products. World of Haiku is designed for beginners in command-line Linux and/or cybersecurity. Haiku Pro is designed for advanced cybersecurity students and cybersecurity professionals who want to practice advanced skills in offensive, defensive, and forensic cybersecurity. Both products keep track of the learner's skills and use those to both locate jobs requiring those skills and to present those skills in the form of a skills resume to demonstrate to teachers or employers.

Website
https://www.haikuinc.io
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Henderson, NV
Type
Privately Held
Founded
2020
Specialties
cybersecurity training, games that train, gamified training, cybersecurity jobs, Penetration Testing, cybersecurity, Penetration Testing Labs, Network security, IT Security, ethical hacking, gaming, linux, python, information security, malware, reconnaissance, infosec, hacking, computer science, and pen testing

Locations

Employees at Haiku, Inc

Updates

  • View organization page for Haiku, Inc, graphic

    6,522 followers

    🚀 Exciting News from Haiku, Inc! 🚀 We are thrilled to announce that Haiku, Inc has achieved SOC 2 Type II compliance, adhering to the rigorous standards set by the American Institute of Certified Public Accountants (AICPA) for SOC for Service Organizations (SSAE 18). This accomplishment, verified by an unqualified opinion, highlights our dedication to providing enterprise-level security for all data on the Haiku platform. Our platform, built on the Unity game engine, enables the creation of digital twins of computer networks. This innovative solution allows our customers to train employees in cybersecurity and networking, model malware effects, and test real-time threats in a safe and controlled environment. A huge thank you to Prescient Security and the Vanta platform for their support in our compliance journey. Prescient Assurance is a leader in security and compliance attestation, offering comprehensive risk management and assurance services worldwide. This achievement not only showcases our commitment to protecting customer data but also underscores our mission to enhance cybersecurity training and resilience. We're proud to demonstrate that Haiku, Inc maintains the highest standards of security and compliance. For more details, please reach out to us at info@haikuinc.io. San Diego Cyber Center of Excellence (CCOE) Andrew Serwin Lisa Easterly Chris Kelly The Veteran Fund Kasey Gasca Neal Bridges 👉🏼 Gerald Auger, Ph.D. https://lnkd.in/g3y3SaDt #Cybersecurity #Compliance #SOC2 #DigitalTwins #Security #HaikuInc

    Haiku, Inc Achieves SOC 2 Type II Compliance, Demonstrating Commitment to Enterprise-Level Security

    Haiku, Inc Achieves SOC 2 Type II Compliance, Demonstrating Commitment to Enterprise-Level Security

    haikuinc.io

  • View organization page for Haiku, Inc, graphic

    6,522 followers

    Why Game-Based Training in Cybersecurity Might Be Your Best Bet In an age where cyber threats are evolving faster than most organizations can keep up, traditional training methods are falling short. That's where game-based training comes in, offering not just a solution, but a revolution in how we approach cybersecurity education. At Haiku Inc., we're pioneering a shift towards immersive learning with our unique Games that Train platform. By leveraging the natural human propensity for play and competition, we've seen firsthand how effectively this methodology enhances learning outcomes. Dive into the core of our strategy: getting users into a flow state, maximizing their engagement, and supercharging their ability to assimilate complex information. The result? A staggering 500% increase in learning efficiency. But it's not just about engagement; it's about measurable outcomes. With our Haiku Forge tool, we empower educators and organizations to create their own game-based training scenarios tailored to their specific needs. This isn't hypothetical; research underscores our success, indicating an average 24% uplift in hands-on skills after just one hour of training on our platform. In conclusion, as the digital landscape becomes increasingly perilous, it's clear that conventional training methods need a rethink. Game-based training offers not just an alternative but a superior pathway to equipping individuals and organizations with the critical cybersecurity skills they need to defend against evolving threats. It's time to embrace this paradigm shift and redefine what effective learning looks like in the cyber domain.

  • View organization page for Haiku, Inc, graphic

    6,522 followers

    Beware, Apple users! You're under attack - but it's not what you think. Several Apple customers have been caught in a devious web spun by cyber fraudsters. Imagine your device being flooded with incessant system-level prompts, rendering it unusable until you respond to each one. What's one way to shake free from this entanglement? Don't give in to impatience, and don't press the wrong button upon receiving the umpteenth password reset request. But wait, there's a twist. Just as you regain control, a call comes in. The caller ID reads - Apple support. The friendly voice on the other end says your account is under siege, requiring immediate "verification" of a one-time code. A relief? Think again. It's a scam. The sophisticated schemers are spoofing Apple support and setting a trap under the guise of helping. Stay vigilant. Stay alert. And remember, your first line of defense is awareness. Read more about this scam here and protect yourself: https://lnkd.in/giuTAMv4 Have you seen this scam in the wild? Share in the comments your best practices to enlighten others!

    • No alternative text description for this image
  • View organization page for Haiku, Inc, graphic

    6,522 followers

    🚀 The Harvester: A Powerful Cybersecurity Tool 🚀 🤔 Ever wondered which practical switches you should use for The Harvester cybersecurity tool? 💡 Look no further! Here are some key switches and when to use them: 1️⃣ -d: Domain 🌐 Use this switch when you want to specify the domain you're targeting. It's a must-have for starting your search! 2️⃣ -b: Data Source 📊 Customize your data source with this switch. Choose from popular options like Google, Bing, or LinkedIn! 3️⃣ -l: Limit 🔢 Set a limit on the number of search results returned. This helps keep your search focused and manageable. 4️⃣ -s: Start 🎯 Begin your search at a specific result number. Great for continuing a previous search or jumping ahead. 5️⃣ -v: Verbose 🔍 Get more detailed information during your search. Perfect for understanding the progress and fine-tuning your approach. Remember, The Harvester is a powerful tool for gathering valuable information about your target. Make the most of it by mastering these practical switches! 💪🔧

  • View organization page for Haiku, Inc, graphic

    6,522 followers

    Imagine a canvas where your ideas aren't just ideas but the blueprint for innovation. Welcome to Haiku Forge, our Unity-based simulation powerhouse. Gone are the days of static diagrams and hypothetical scenarios. With Haiku Forge, you're not just drawing network architectures; you're breathing life into them. Picture this: a network design tool that doesn't stop at the drawing board but extends into the realm of real-world application. Test subnetting, routing, and services on networks you architect, all within a digital space. But why stop there? The challenge of simulating wireless networks in cloud-based cyber ranges has puzzled many. Haiku Forge stands as the solution, offering a dynamic environment for crafting and testing wireless network training. The concept of a digital twin is revolutionizing industries, and Haiku Forge is your gateway. Duplicate your network, create various training scenarios, and watch as your digital twin transforms into a multi-purpose training field. Training SOC Analysts and transitioning help desk personnel into IT roles has never been more seamless. Haiku Forge's immersive simulations provide real-world challenges and scenarios, turning novices into seasoned professionals. The question isn't what Haiku Forge can do—it's what you can do with Haiku Forge. Whether you're architecting the networks of tomorrow, pioneering new training methodologies, or crafting digital twins for intricate simulations, the possibilities are boundless. Dare to innovate. Dive into Haiku Forge. What will you create?

    • No alternative text description for this image
  • View organization page for Haiku, Inc, graphic

    6,522 followers

    Important update from Cybersecurity and Infrastructure Security Agency reg. a Russian nation-state threat at U.S. corporations, including Microsoft San Diego Cyber Center of Excellence (CCOE) Vishal Amin Lisa Easterly

    🚨New: We publicly issued Emergency Directive (ED) 24-02 which requires emergency action by federal civilian agencies following Russian state-sponsored actors targeting Microsoft's corporate email system: https://lnkd.in/g96jM44a Midnight Blizzard is using information initially exfiltrated from Microsoft corporate email systems, including authentication details shared between Microsoft customers and Microsoft by email, to gain, or attempt to gain, additional access to Microsoft customer systems. The Directive was initially issued to federal agencies on April 2nd based upon currently available threat information and limited applicability of relevant actions, which are predicated on notification of exposed credentials by Microsoft. While ED 24-02 requirements apply only to FCEB agencies, other organizations may have been impacted by the exfiltration of Microsoft corporate accounts and should contact Microsoft for guidance. Regardless of direct impact, all organizations are strongly encouraged to apply stringent security measures, including strong passwords, multifactor authentication (MFA) and prohibited sharing of unprotected sensitive information via unsecure channels. https://lnkd.in/g96jM44a

    • No alternative text description for this image
  • Haiku, Inc reposted this

    View organization page for Ember River, graphic

    402 followers

    On March 13th, a group called "Solntsepek" claimed responsibility for attacks on four Ukrainian Internet Service Providers (ISPs), because of their connection to government agencies in Ukraine. Solntsepek has ties to Russian military intelligence (GRU) and previously targeted Kyivstar, Ukraine's largest telecom provider, in December. It's suspected that the group used an updated version of the malware AcidRain, named AcidPour, which has the capability to target not only modems but also various other devices. AcidPour's ability to target memory in embedded devices makes it significantly more dangerous, prompting concerns from experts like Rob Joyce, the outgoing director of the NSA, who labeled AcidPour "a threat to watch." #cybersecurity #cyberthreat #cyberattack #malware #emberriver #emberecho #emberintel 

    • No alternative text description for this image
  • Haiku, Inc reposted this

    View profile for Maria Kristina H., graphic

    OUTFOXM Founder & CEO | Ex-DIA | Cyber Hygiene Expert | Keynote Speaker | Media Commentator

    😡It was just a matter of time! I toured 16 apartment buildings in the last year and told all 16 leasing agent about the cyber risks of “smart locks.” Not a single agent had heard of the risks, and I encouraged them to inform their management. My husband wanted to kill me by the last tour but people need to know! You better believe we chose a building with good old fashioned locks and keys. 🔑🔑 #outfoxm #cyberaware #cyberhyiene #cybersmart #cybersecurity

    The U.S. government is warning that smart locks securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock’s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Meanwhile, Chirp’s parent company, RealPage, Inc., is being sued by multiple U.S. states for allegedly colluding with landlords to illegally raise rents. https://lnkd.in/euzzSj2F

    Crickets from Chirp Systems in Smart Lock Key Leak

    Crickets from Chirp Systems in Smart Lock Key Leak

    krebsonsecurity.com

  • View organization page for Haiku, Inc, graphic

    6,522 followers

    **Is Game-Based Learning the Future of Cybersecurity Training? Let's Dive In!** In an age where cyber threats are evolving at an unprecedented pace, traditional training methods struggle to keep up. Enter game-based learning - a revolutionary approach promising not only to enhance cybersecurity skills but also to make learning engaging and fun. But how effective is it really? Research shows that learners can see up to a 24% increase in hands-on skills after just one hour of game-based training. At Haiku Inc., we've taken this concept further with our Haiku Forge tool, empowering users to create their own training games. It's about making complex concepts accessible and engaging, ensuring that learning isn't just a task but a thrilling adventure. As we continue to develop these interactive learning environments, it's clear that the fusion of gaming and education holds untapped potential for the cybersecurity industry. By capturing the learner's attention and immersing them fully into real-world scenarios, we're not just preparing them for the threats of today but equipping them with the adaptability and quick thinking needed for the challenges of tomorrow. So, what do you think? Is game-based learning set to revolutionize how we prepare our future cyber defenders? As we chart this exciting territory, one thing is certain: the intersection of education and entertainment has never been more promising for cybersecurity training. #CybersecurityEducation #GameBasedLearning #FutureOfLearning #CyberTraining

    • No alternative text description for this image

Similar pages

Browse jobs