Blog

NH Learning Solutions Blog

Top 20 Technical & Application Courses of 2019

Top 20 Technical & Application Courses of 2019

2019 has come and gone and it was another great year at New Horizons. In 2019 we delivered over 12,490 classes to students in all formats, including: Private Group Training, Instructor Led Training (ILT), and Online LIVE classes (OLL).

4 Growing Cybersecurity Threats in 2019

4 Growing Cybersecurity Threats in 2019

Regardless of your industry, awareness and prevention of cybersecurity threats must be a priority. New industries, born from advances in technology, merely serve as new opportunities for cyber-criminals. Here are 4 growing cybersecurity threats that organizations everywhere need to be aware of. 

3 Cyber Trends That Are Still Relevant in 2019

3 Cyber Trends That Are Still Relevant in 2019

Cyber attack methods don't disappear overnight. Hackers and cyber-criminals will continue to use proven methods that get them the results they are looking for. Here are 3 cybersecurity trends that continue to be an issue for organizations everywhere. 

Cybersecurity Webinars this October from New Horizons

Cybersecurity Webinars this October from New Horizons

October is National Cyber Security Awareness Month (NCSAM), which is an annual campaign to raise awareness about the importance of cybersecurity. NCSAM aims to engage and educate public and private sector partners through events and initiatives, while providing tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident. Here are several must-attend cybersecurity webinars taking place this October at New Horizons.

Top 20 Technical & Application Courses of 2018

Top 20 Technical & Application Courses of 2018

2018 is nearly in the rearview mirror and it has been another great year at New Horizons. In 2018 we delivered over 12,000 classes to students in all formats, including: Private Group Training, Instructor Led Training (ILT), and Online LIVE classes (OLL).

Infographic: The Benefits of Blockchain

Infographic: The Benefits of Blockchain

Blockchains are proving to be key in a world where everything is moving to a digital platform. From improving processes where people need to access, verify, send or store information securely, this system of organizing and storing information ensures several benefits. Download our infographic for a closer look at the advantages of blockchain.

Infographic: Today's Cybersecurity Reality in 2018

Infographic: Today's Cybersecurity Reality in 2018

Cybersecurity practitioners face challenges when it comes to having a security program that operates effectively. Sometimes it means looking at cybersecurity through the lens of capability and focus on the understanding of what risks there are. Download our infographic for a closer look at the cybersecurity realities thus far in 2018.

Infographic: Cyberattack Trends in 2018

Infographic: Cyberattack Trends in 2018

When it comes to the global cyber landscape, threats are ever evolving, keeping organizations as well as the security community constantly challenged. In 2018, the different strains of malware and their authors have proven to be capable of much more than previously imagined, with more sophistication and with a new level of agility. Download our infographic for a closer look at cyber-attack trends thus far in 2018.

Infographic: The State of Cybersecurity in 2018

Infographic: The State of Cybersecurity in 2018

As cyberattacks continue to increase, the threat landscape and defense techniques in IT are constantly shifting to combat issues. Now more than ever, defenders are evolving their own set of technological advances to combat threats. Download our infographic for a closer look at the state of cybersecurity thus far in 2018.

5 Tips for Building a Cyber Resilience Strategy

5 Tips for Building a Cyber Resilience Strategy

You’ve spent endless time, money, and resources to secure your infrastructure. You have all the right malware detection, encryption, and firewalls in place. But when a cyber-attack inevitably hits, will your business be able to function in the aftermath?

Subscribe to Our Blog