How Big Data Is Transforming the Education

Now, a rare person will be surprised by the presence and active usage of modern technologies in the education and the learning process, in particular.   Nowadays, the world is changing at a rapid speed, bringing innovations in all the life spheres. And education hasn’t become an exception. On the contrary, people devote special attention […]

Pulse Secure Announces Collaboration with New Strategic Authorized Education Partners

This post was originally published here by Pulse Secure. SAN JOSE, Calif. –  April 10, 2019 – Pulse Secure, the leading provider of software-defined Secure Access solutions, today announced that it has teamed up with Dynamic Worldwide Training Consultants (DWWTC) and Westcon Americas, A Division of SYNNEX, to deliver the new Pulse Secure Authorized Training program to […]

Cloud Security Needs in Higher Education

This post was originally published here by Will Houcheime. Organizations in higher education have a unique set of challenges when it comes to cybersecurity. They store and process a wide variety of data in the course of their day-to-day operations and, consequently, must also comply with a complicated set of regulatory demands. In the latest […]

Education: A Cloud Security Investigation (CSI)

This post was originally published here by Will Houcheime . Cloud computing is now widely used in higher education. It has become an indispensable tool for both the institutions themselves and their students. This is mainly because cloud applications, such as such as G Suite and Microsoft Office 365, come with built-in sharing and collaboration functionality – they are designed […]


This post was originally published here by  (ISC)² Management. Every year, (ISC)² and The Centre for Cyber Safety and Education award a range of scholarships to individuals pursuing, or planning to pursue a degree in cybersecurity or information security. Addressing the cybersecurity skills gap The aim of these initiatives are to help bridge the cybersecurity workforce skills gap – which our research […]

Role of Cyber Threat Intelligence Analysts in an Organization

Threat intelligence is evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Historically, intelligence tactics, techniques, and procedures as well as various types of intelligence operations existed long before cyberspace was conceived. Intelligence […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!