Hacking

The Best cyber security CERTIFICATIONS in 2023

What are the Best CyberSecurity Certifications in 2023? (List of the Top 10)

It’s that time of the year again. Here at ISCN, we bring you an objective list of the top 10 best cybersecurity courses in 2023! This comes from us asking our 100,000-strong ISCN LinkedIn group of cyber security professionals to rank their favorite cyber security courses. Read on to see the results below. NOTE: We …

What are the Best CyberSecurity Certifications in 2023? (List of the Top 10) Read More »

Stuck at home? Level up with online cyber security certifications

Stuck at home during the lockdown? Use this time to ‘Level Up’ with our top 3 online cyber security certifications

With ‘half of humanity under lockdown‘, it is likely that you are reading this from your home, or wherever it is that you are isolating yourself. This is an unprecedented and hugely distressing time for many of us, especially for those of us who have lost any friends or family as a result of COVID-19. For …

Stuck at home during the lockdown? Use this time to ‘Level Up’ with our top 3 online cyber security certifications Read More »

The 5 biggest Cyber Security stories of 2019

2019, like every other year in recent times, has been rammed full of cyber security attacks. For most people, these are scary times. However, if there is a silver-lining to this cloud, then it’s for cyber security professionals. The one positive from all of these attacks is that cyber security specialists are needed. Here’s a …

The 5 biggest Cyber Security stories of 2019 Read More »

Quantum Computing

Quantum computing and the threat to to information security

Introduction – what is quantum computing? This has been defined as technology that: “makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data.” (Source: https://www.sciencedaily.com/terms/quantum_computer.htm) How does quantum computing work? In order to understand quantum computers, it helps to first understand ‘traditional’ computers. The computer or phone …

Quantum computing and the threat to to information security Read More »

The Top 5 Cyber Security News Stories this Month (March, 2019)

This post aims to give you a quick update about the top 5 cyber security news stories which have happened in March, 2019. 1. The Facebook DNS attack Anyone who still uses Facebook will know that the service (for many users, but not all) was temporarily down for several hours earlier this month. This was …

The Top 5 Cyber Security News Stories this Month (March, 2019) Read More »

APT Coupon and CND Coupon

Discounts Now Available for 2 New EC-COUNCIL Courses

ISCN Announces 2 New Discount Codes ISCN is pleased to announce that – through the ISCN Discount Code (INFOSEC15) – you can now save 20% on 2 new EC-Council Courses: The Certified Network Defender (CND) Online Course, as well as the Advanced Penetration Testing (APT – CAST 611) Online Course. Certfied Network Defender (CND) The …

Discounts Now Available for 2 New EC-COUNCIL Courses Read More »

Black Monday - KRACK and ROCA vulnerabilities

Black Monday – KRACK WiFi and ROCA RSA vulnerabilities

Are you affected by KRACK and ROCA, and how can you manage this? Monday October 16th, 2017 is already being referred to as “Black Monday” in information security circles. In case you haven’t already heard the news, two separate major security vulnerabilities – KRACK and ROCA – were announced that affect everyone globally who uses …

Black Monday – KRACK WiFi and ROCA RSA vulnerabilities Read More »

Hacker

Which are the Preferred Operating Systems of Professional Hackers?

ISCN BLOG: Which are the Preferred Operating Systems of Professional Hackers? # Who are the real hackers? The term ‘real hackers’ does not refer to white hat hackers and security researchers. Instead, it relates to cybercriminals and hacktivists. They are also called gray hat or black hat hackers since they work against media enterprises, the …

Which are the Preferred Operating Systems of Professional Hackers? Read More »