Home Search
online learning - search results
If you're not happy with the results, please do another search
Deepfakes: A Growing Cybersecurity Concern
In tandem with developments in cybersecurity technology, cybercriminals have started getting more innovative with their attacking techniques. Threat actors are leveraging advanced technologies like...
2021 Predictions: Holistic, Centralized, Software-Defined, and Automated Security that is Everywhere
The year that has been 2020 has been a cornucopia for cybercriminals who have been able to feast off an extended attack surface, a...
Ransomware Attacks in 2020! These are 4 Most Affected Sectors
From a local food retailer to a multi-national company, ransomware attacks continue to loom over cyberspace. Ransomware operators target victims by encrypting their sensitive...
Watch Out for These Three Cyberthreats in 2021
The unexpected crisis in 2020 impacted almost every business globally. The turmoil resulted in several changes in the traditional business operation models. Even cybercriminals...
AI-Powered Cybersecurity: From Automated Threat Detection to Adaptive Defense
Cybersecurity, the protection of IT infrastructures and communication networks in cyberspace and cyber-physical systems, is becoming increasingly important, covering threat detection and security countermeasures...
570% Increase in Bit-and-Piece DDoS Attacks: Research
The second quarter of 2020 witnessed an unprecedented increase in DDoS attacks compared to the same period last year. According to Nexusguard Q2 2020...
CYBERSEC: Make Cybersecurity a Global Effort
The Kosciuszko Institute successfully launched CYBERSEC Global 2020 on September 28. For the 6th time, the conference becomes a platform to discuss various paths...
McAfee Consumer Security Portfolio Integrates Social Media and Tech Scam Protection
With the home, school, and the office now becoming a common space for employees, the attack surface broadens to includes consumers and endpoints. Employees...
Five Practical Steps to Implement a Zero-Trust Network
While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security...
“Attackers are looking to break into your organization either by a broken VPN or...
It’s not every day that one gets to meet an influential person from the world of cybersecurity. CISO MAG caught up with Yotam Gutman,...