Cybersecurity Blog


July 12, 2023 05:21 PM
Organizations suffering a data breach incur huge costs, often paid for by the customer. Whether you are a manager in an organization or just an average consumer, cybersecurity breaches cost you money. The question is, how much?
July 08, 2023 10:25 PM
Most people know not to fall for suspicious emails sent by those claiming to be Nigerian princes or long-lost relatives. But as technology advances, cyber threats have grown increasingly prevalent and sophisticated. Artificial intelligence (AI) and machine learning offer new ways to fight cybercrime.
May 03, 2023 12:58 PM
When a business invests in cybersecurity, it is to protect its data, devices and networks from being accessed by an unauthorized party and to prevent criminal activity through company systems. It ensures that sensitive information is kept confidential and available while maintaining its integrity.
February 02, 2023 07:55 PM
If you’re thinking of pursuing a career in cybersecurity, then you've picked the perfect time. Data breaches, online fraud and sensitive data leaks are nothing to celebrate, but having the skills and ability to fight them certainly is.
January 24, 2023 10:26 AM
Cybersecurity spending is projected to reach over $188 billion in 2023, with almost 3.5 million open cybersecurity jobs along with it. Employment of information security analysts alone is projected to grow 35 percent from 2021 to 2031, which is four times faster than the average for all occupations.
January 13, 2023 11:20 AM
In this article, we discuss key cybersecurity threats and potential risks, how businesses can be protected from potentially devastating attacks, and cybersecurity best practices that you can implement at your organization.
October 03, 2022 07:04 PM
The Yeshiva University Katz School of Science Health has teamed up with Cyberbit, provider of the world's leading cybersecurity skill development platform, to give Katz online MS in Cybersecurity students an unprecedented opportunity to master cyber defense skills in live-fire simulations.
September 27, 2022 03:20 PM
Yeshiva University’s Katz School of Science and Health is excited to offer students in our online Master’s in Cybersecurity program an unparalleled opportunity for cyber defense skills development through realistic, real-time cyber-attack simulations.
September 27, 2022 02:26 PM
The fast-paced and rapidly growing cybersecurity career field urgently needs more qualified professionals. Because the stakes are high, the bar for entry into this dynamic field is also set high. To become a successful cybersecurity professional, you need both conceptual training and hands-on experience.
July 18, 2022 06:54 AM
Yeshiva University’s Katz School of Science and Health is proud to share that Fortune has ranked our online Master’s in Cybersecurity program as #2 for Best Online Master’s in Cybersecurity Degrees in 2022.
April 07, 2022 01:26 PM
2020 alum Jonathan Deutsch shares why he chose Katz for his master’s degree and how it’s influenced his view on leadership in technology.
March 01, 2022 10:23 AM
Distributed Denial-of-Service (DDoS) attacks are one of the oldest cybersecurity threats and have been around since the early days of the internet. Initially just a mild annoyance instigated by bored individuals to take down servers, DDoS attacks have evolved into complex, automated programs targeting high-profile corporations and government agencies.
January 18, 2022 12:00 AM
There's an array of SIEM platforms available today that incorporate a diverse selection of tools and accommodate businesses of any size and within any industry. As two of the most popular of these tools, many experts in the cybersecurity industry debate between using QRadar vs. Splunk. While both products have powerful monitoring and analysis tools that would benefit most business types, it's important to understand their differences before deciding which one is best for you.
January 06, 2022 12:25 PM
When companies create or release software, they organize the programming code in a way that makes it impossible to change without access to the underlying source code. But sometimes, businesses need to alter certain parts of that code for software to work with their existing IT systems. In these instances, developers use reverse engineering software to legally alter, customize, or change pre-programmed computer software.
January 06, 2022 11:42 AM
In this blog post, we will discuss the 10 best open source SIEM tools listed above. If you're interested in learning more about open source SIEM tools or becoming a cybersecurity expert, consider enrolling in an online master's program in cybersecurity.
December 29, 2021 03:55 PM
An accomplished professor, director, founder, solution architect, and cyber veteran, Sivan has her hand in almost every aspect of the industry—from education and training to implementation and evolution. However, we know her most fondly as the Program Director for the Master’s Degree in Cybersecurity at Yeshiva University’s Katz School of Science and Health.
October 20, 2021 06:08 PM
Ransomware attacks have become the bane of modern cybersecurity, and few are as insidious as Ryuk, a malware infection impacting governments and businesses globally. Read on to uncover the history, methods, and notable attacks with Ryuk ransomware, including how you can keep your or someone else’s valuable data out of its clutches.
October 13, 2021 03:47 PM
As malware variants have grown increasingly more complex, the use of free, open source malware analysis tools to counteract them has increased, too. Keep reading to learn more about the five best open source malware analysis tools for 2021, their key features, why they are helpful, and why they can be risky to use.
September 22, 2021 08:49 PM
To guarantee a heightened degree of safety awareness, cybersecurity professionals have devised a training exercise based on military drills that pit two teams against each other. Depending on your job within the cybersecurity department, you are placed on either the red team (attackers) or the blue team (defenders).
September 09, 2021 05:42 PM
Ransomware is the most prominent type of malware used in cyber attacks. It uses encryption to make an organization’s internal data and files inaccessible to its owners, thus effectively holding the data at ransom. Usually, hackers will demand a payment or sensitive information to provide the key to unlock the encryption and access the data or system again.
1 2 3
1 2 3

Yeshiva University has engaged Everspring, a leading provider of education and technology services, to support aspects of program delivery