Home Search

online learning - search results

If you're not happy with the results, please do another search

“Until now, technology gave you no protection and confidentiality when you shared your data”

0
There is a critical business challenge when it comes to sharing data between entities, such that any one person or firm should not see...
Nick Palmer

“Bot attacks can create inconvenience for legitimate users”

0
Apart from cyberattacks on the health care sector and phishing and ransomware campaigns targeting employees working remotely, 2020 also witnessed an increased surge in...
Top Cybersecurity Jobs in 2021

These are the Top 5 Cybersecurity Jobs in 2021

0
Digital security is becoming more critical than ever with organizations moving towards rapid digital transformation and automation.  Securing valuable data, programs, intellectual property, and...
Apple App Store, Apple vulnerabilities

Why Apple Removed Millions of Apps from App Store?

0
Identifying and preventing fraudulent apps have become a rising challenge for companies globally. Recently Apple disclosed that, in 2020, it prevented nearly 1 million...
Cybersecurity and Small Unmanned Aircraft Systems(sUAS) or Drones

Cybersecurity Considerations with the Increasing Uses of Small Unmanned Aircraft Systems (sUAS) or Drones

0
The effort to produce this information resource results from a collaborative effort between the Bergen County Technical Schools (high school), through the advisor Andrea...
Internet of Things

Securing Industrial IoT Infrastructures

0
Industries across the spectrum are embracing the emerging possibilities of IoT and the connected device ecosystem. The benefits of IoT include unlocking the potential...
PII for social engineering attacks

“Every bit of compromised PII can be used for social engineering attacks to target...

0
Marcus Fowler is Director of Strategic Threat at Darktrace. Before joining Darktrace in 2019, he spent 15 years at the Central Intelligence Agency (CIA)...

Identity Management Day: Here’s What Experts Have to Say

0
Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every...
“PerSwaysion” Phishing Campaign Targets High-Ranked Professionals Across The Globe, IKEA email reply-chain attack

Most Phishing Emails Originate from Eastern Europe: Barracuda

0
Phishing attacks remain a severe threat to small and large organizations globally. It is the most common and popular technique for cybercriminals to pilfer...
DHS

DHS to Launch 60-day Cyber Sprints to Prevent Ransomware Attacks

0
The increasing ransomware attacks have become a severe issue for all nations globally. From the health care sector to information technology, ransomware attacks continue...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe