Security & Privacy


Training the Next Generation of Space Cybersecurity Experts

CT asked Scott Shackelford, Indiana University professor of law and director of the Ostrom Workshop Program on Cybersecurity and Internet Governance, about the possible emergence of space cybersecurity as a separate field that would support changing practices and foster future space cybersecurity leaders.

three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

Report: Identity Has Become a Critical Security Perimeter for Cloud Services

A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

 laptop on a clean desk with digital padlock icon on the screen

Study: Data Privacy a Top Concern as Orgs Scale Up AI Agents

As organizations race to integrate AI agents into their cloud operations and business workflows, they face a crucial reality: while enthusiasm is high, major adoption barriers remain, according to a new Cloudera report. Chief among them is the challenge of safeguarding sensitive data.

Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

Microsoft Announces Security Advancements

Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.

laptop and fish hook

Security Firm Identifies Generative AI 'Vishing' Attack

A new report from Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.

AI robot with cybersecurity symbol on its chest

Microsoft Adds New Agentic AI Tools to Security Copilot

Microsoft has announced a major expansion of its AI-powered cybersecurity platform, introducing a suite of autonomous agents to help organizations counter rising threats and manage the growing complexity of cloud and AI security.

glowing shield hovers above a digital cloud platform with abstract data streams and cloud icons in the background

Google to Acquire Cloud Security Firm Wiz

Google has announced it will acquire cloud security startup Wiz. If completed, the acquisition — an all-cash deal valued at $32 billion — would mark the largest in Google's history.

smartphone with a glowing lock and shield icon at its center, surrounded by floating security symbols like a fingerprint, key, and authentication checkmark

Jamf to Acquire Identity Automation, Combining Identity and Device Management in One Platform

Apple mobile device management company Jamf has announced the intent to acquire Identity Automation, a provider of identity and access management (IAM) solutions for K-12 and higher education.

lock with a glowing keyhole integrated with a transparent, layered server stack against a dark background with a subtle grid pattern

Cohesity Integration Adds Protection for Red Hat OpenShift Virtualization Workloads

AI-powered data security company Cohesity has expanded its collaboration with Red Hat to enhance data protection and cyber resilience for Red Hat OpenShift Virtualization workloads.

person typing on a touch screen schedule plan calendar

2025 Tech Tactics in Education Conference Agenda Announced

Registration is free for this fully virtual May 7 event, focused on "Thriving in the Age of AI" in K-12 and higher education.