2020 alum Jonathan Deutsch shares why he chose Katz for his master’s degree and how it’s influenced his view on leadership in technology.
March 01, 2022
Distributed Denial-of-Service (DDoS) attacks are one of the oldest cybersecurity threats and have been around since the early days of the internet. Initially just a mild annoyance instigated by bored individuals to take down servers, DDoS attacks have evolved into complex, automated programs targeting high-profile corporations and government agencies.
February 21, 2022
When hackers strike, every IT and cybersecurity professional in an organization goes on red alert. This is the moment they’ve been training for—it’s time to put their education into action. But for security analysts to be competitive and successful, they must stay up-to-date with the latest types of cyberattacks and understand how hackers think and operate. One of the best ways to do this is with a hacking simulator.
January 18, 2022
There's an array of SIEM platforms available today that incorporate a diverse selection of tools and accommodate businesses of any size and within any industry. As two of the most popular of these tools, many experts in the cybersecurity industry debate between using QRadar vs. Splunk. While both products have powerful monitoring and analysis tools that would benefit most business types, it's important to understand their differences before deciding which one is best for you.
January 06, 2022
When companies create or release software, they organize the programming code in a way that makes it impossible to change without access to the underlying source code. But sometimes, businesses need to alter certain parts of that code for software to work with their existing IT systems. In these instances, developers use reverse engineering software to legally alter, customize, or change pre-programmed computer software.