article thumbnail

Duo’s Data-Driven Defense: Combatting Cyber Threats in Higher Education

Duo's Security Blog

Duo has a long history of protecting students across universities and higher education institutions. Because Duo has such a large presence in the world of education, we can also spot trends in attack tactics and learn how to better secure your organization. But the importance of secure policies should not be ignored.

Education 119
article thumbnail

GUEST ESSAY: The promise and pitfalls of using augmented reality– ‘AR’ — in cybersecurity

The Last Watchdog

Quite like how pilots use AR simulation in training, cybersecurity professionals can use AR-enabled training simulations that immerse them in hyper-realistic scenarios, offering hands-on cyber defense training and education. Waqas Apart from the training aspect, AR technology can also be used to enhance threat detection in real-time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI-Powered Phishing: Defending Against New Browser-Based Attacks

SecureWorld News

Key strategies for combating AI-powered phishing AI-driven threat detection: Implement advanced browser security solutions that use AI to detect anomalies and potential threats in real-time.

Phishing 114
article thumbnail

Identity Threat Trends for Higher Education

Duo's Security Blog

As a new semester begins, we at Cisco Duo want to share some findings and trends pertaining to threat activity we have seen across higher education customers. In analyzing de-identified customer data over the latter half of 2023, we found a pattern of threat activity targeting multiple universities using shared attack infrastructure.

Education 131
article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

Despite widespread cloud adoption, most SecOps teams rely on outdated, on-premises alert tools, leading to missed threats and wasted resources on false positives. Dooley Doug Dooley , COO, Data Theorem In 2025, cybersecurity threats will escalate across APIs, cloud setups, supply chains, and cryptocurrency.

Risk 173
article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

Key findings: the cyber threat landscape in 2025 1. Ransomware and state-sponsored attacks continue to escalate Canada's critical sectorsincluding healthcare, energy, education, and retailhave become prime targets for cybercriminals. Education: Budget constraints make institutions a low-hanging fruit for cybercriminals.

InfoSec 76
article thumbnail

MUT-1244 Campaign Steals Hundreds of Thousands of WordPress Credentials and More

SecureWorld News

The use of popular code-sharing platforms like GitHub as an attack vector shows the critical need for robust verification processes and real-time threat detection in development workflows." What Organizations Can Do Verify the Source of Tools : Ensure PoC exploits and other tools come from verified and trusted sources.

Phishing 109