education
![Brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/27085037/brain-ml-400x200.jpg)
As technology develops in education so does the need for cybersecurity
The COVID-19 pandemic has had a profound impact on education, bringing about a sudden boom in remote and online learning. While the transition has forced many schools to …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/18135226/zero-number-1-400x200.jpg)
Migration delays prevent AD-centric zero trust security framework adoption
37 percent of IT professionals rated rapid changes in their AD/AAD environment as the key impact of COVID-19 on their organization’s identity management team, a One Identity …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Remote and cloud-based systems to be ruthlessly targeted next year
Home networks, remote working software and cloud systems will be at the center of a new wave of attacks in 2021, Trend Micro predicts. Cybercriminals in 2021 will particularly …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/17081348/table-idea-400x200.jpg)
Why microlearning is the key to cybersecurity education
Cyber attacks are on the rise during this year of uncertainty and chaos. Increased working from home, online shopping, and use of social platforms to stay connected and sane …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
What is the future of working professional education?
The Executive MBA Council (EMBAC) published research which addresses how business education needs to evolve to keep pace with changing demands and expectations about …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102521/ai-400x200.jpg)
Cyber risk literacy should be part of every defensive strategy
While almost 95 percent of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103433/architecture-400x200.jpg)
SMBs’ size doesn’t make them immune to cyberattacks
78% of SMBs indicated that having a privileged access management (PAM) solution in place is important to a cybersecurity program – yet 76% of respondents said that they do not …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
4.83 million DDoS attacks took place in the first half of 2020, a 15% increase
Attackers focused on COVID-era lifelines such as healthcare, e-commerce, and educational services with complex, high-throughput attacks designed to overwhelm and quickly take …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
Views and misconceptions of cybersecurity as a career path
Attitudes toward cybersecurity roles are now overwhelmingly positive, although most people still don’t view the field as a career fit for themselves, even as 29% of …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/22135014/user-3d-400x200.jpg)
Infosec pros struggle to find opportunities to improve their work skills
Cybrary released the findings from the report which examines the current challenges, perceptions, and impacts of the cybersecurity skills gap faced by IT and security teams …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105805/cloud-400x200.jpg)
Half of IT teams can’t fully utilize cloud security solutions due to understaffing
There are unrealized gaps between the rate of implementation or operation and the effective use of cloud security access brokers (CASB) within the enterprise, according to a …
![work from home](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/28085110/wfh-desk-400x200.jpg)
Lack of technology skills creates a dent in remote workers’ productivity
The lack of technology skills is contributing to a dent in productivity as workers struggle to adapt to working from home over prolonged periods. Questionmark is calling on …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege