{"id":6971,"date":"2025-12-24T14:42:36","date_gmt":"2025-12-24T11:42:36","guid":{"rendered":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/?p=6971"},"modified":"2026-02-16T14:44:14","modified_gmt":"2026-02-16T11:44:14","slug":"national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era","status":"publish","type":"post","link":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","title":{"rendered":"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>The Departments of Computer Engineering and Information Technology organized a <strong>National Workshop on Cybersecurity Challenges and Solutions \u2013 Threat Detection and Prevention in the Digital Era<\/strong> on December 8, 2025, at the Campus Main Building Hall.<\/p>\n<p>The workshop aimed to raise awareness of modern cybersecurity challenges and highlight practical strategies for protecting digital systems and data. <strong>Mr. Hemin Sardar<\/strong>, Lecturer at Charmo University, delivered a session on cybersecurity risks, emerging technologies, and strategic defense solutions. <strong>Assistant Professor Dr. Aso Aladin<\/strong> from Tishk International University followed with a presentation on the role of generative artificial intelligence in modern cyber threat detection.<\/p>\n<p>Faculty members, undergraduate and postgraduate students, and IT professionals participated in the event. Through expert-led presentations and interactive discussions, attendees gained valuable insights into current cyber threats and effective prevention techniques. The workshop emphasized the importance of collaboration, awareness, and responsible use of advanced technologies to enhance digital security.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Keywords<\/strong>: Cybersecurity, National Workshop, Threat Detection, Artificial Intelligence, Digital Security, Computer Engineering, Information Technology<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1331.2px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-slider-sc\"><div class=\"fusion-flexslider-loading flexslider flexslider-hover-type-none\" data-slideshow_autoplay=\"1\" data-slideshow_smooth_height=\"0\" data-slideshow_speed=\"7000\" style=\"max-width:100%;height:100%;\"><ul class=\"slides\"><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/12\/Copy-of-post.jpg\" class=\"wp-image-12202\" \/><\/span><\/li><li class=\"image\"><span class=\"fusion-image-hover-element hover-type-none\"><img decoding=\"async\" src=\"https:\/\/sul.tiu.edu.iq\/wp-content\/uploads\/2025\/12\/Copy-of-post-5.jpg\" class=\"wp-image-12198\" \/><\/span><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_6 1_6 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:10px;--awb-spacing-right-large:11.52%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:11.52%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":95,"featured_media":6972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[191],"tags":[],"class_list":["post-6971","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-university-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era - TIU<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era - TIU\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\" \/>\n<meta property=\"og:site_name\" content=\"TIU\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-24T11:42:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-16T11:44:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kewan Hama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kewan Hama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\"},\"author\":{\"name\":\"Kewan Hama\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/person\/1370d32c6a98910b66552fea9b79fddb\"},\"headline\":\"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era\",\"datePublished\":\"2025-12-24T11:42:36+00:00\",\"dateModified\":\"2026-02-16T11:44:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\"},\"wordCount\":2129,\"publisher\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#organization\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"articleSection\":[\"University News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\",\"url\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\",\"name\":\"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era - TIU\",\"isPartOf\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"datePublished\":\"2025-12-24T11:42:36+00:00\",\"dateModified\":\"2026-02-16T11:44:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage\",\"url\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"contentUrl\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#website\",\"url\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/\",\"name\":\"TIU\",\"description\":\"Business Management Department\",\"publisher\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#organization\",\"name\":\"Tishk International University\",\"url\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png\",\"contentUrl\":\"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png\",\"width\":4034,\"height\":3631,\"caption\":\"Tishk International University\"},\"image\":{\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\",\"https:\/\/www.instagram.com\/tishk.international.university\/\",\"https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/person\/1370d32c6a98910b66552fea9b79fddb\",\"name\":\"Kewan Hama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g\",\"caption\":\"Kewan Hama\"},\"url\":\"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/author\/kewan_hama_web_editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era - TIU","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","og_locale":"en_US","og_type":"article","og_title":"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era - TIU","og_url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","og_site_name":"TIU","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2025-12-24T11:42:36+00:00","article_modified_time":"2026-02-16T11:44:14+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","type":"image\/jpeg"}],"author":"Kewan Hama","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Kewan Hama","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#article","isPartOf":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/"},"author":{"name":"Kewan Hama","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/person\/1370d32c6a98910b66552fea9b79fddb"},"headline":"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era","datePublished":"2025-12-24T11:42:36+00:00","dateModified":"2026-02-16T11:44:14+00:00","mainEntityOfPage":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/"},"wordCount":2129,"publisher":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#organization"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","articleSection":["University News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/","name":"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era - TIU","isPartOf":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage"},"thumbnailUrl":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","datePublished":"2025-12-24T11:42:36+00:00","dateModified":"2026-02-16T11:44:14+00:00","breadcrumb":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#primaryimage","url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","contentUrl":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-content\/uploads\/2026\/02\/Copy-of-post-5.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/national-workshop-cybersecurity-challenges-and-solutions-threat-detection-and-prevention-in-the-digital-era\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/"},{"@type":"ListItem","position":2,"name":"National Workshop: Cybersecurity Challenges and Solutions: Threat Detection and Prevention in the Digital Era"}]},{"@type":"WebSite","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#website","url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/","name":"TIU","description":"Business Management Department","publisher":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#organization","name":"Tishk International University","url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/logo\/image\/","url":"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png","contentUrl":"https:\/\/sul.tiu.edu.iq\/education\/elt\/wp-content\/uploads\/2020\/09\/Tishk-International-University-Logo.png","width":4034,"height":3631,"caption":"Tishk International University"},"image":{"@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni","https:\/\/www.instagram.com\/tishk.international.university\/","https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q"]},{"@type":"Person","@id":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/#\/schema\/person\/1370d32c6a98910b66552fea9b79fddb","name":"Kewan Hama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2000c2c5244dac1369d5c20b63b6855208a284c68f93b4e07da153892f730eb7?s=96&d=mm&r=g","caption":"Kewan Hama"},"url":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/author\/kewan_hama_web_editor\/"}]}},"_links":{"self":[{"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/posts\/6971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/comments?post=6971"}],"version-history":[{"count":1,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/posts\/6971\/revisions"}],"predecessor-version":[{"id":6973,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/posts\/6971\/revisions\/6973"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/media\/6972"}],"wp:attachment":[{"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/media?parent=6971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/categories?post=6971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sul.tiu.edu.iq\/engineering\/computereng\/wp-json\/wp\/v2\/tags?post=6971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}