Security & Privacy


glowing blue digital shield surrounded by small floating data blocks and locks against a dark gradient background

Rubrik Upgrades Data Protection Platform for Speedier Threat Hunting

Data security specialist Rubrik is upgrading its data protection platform to allow for quicker recoveries in the familiar backup & recovery process.

silhouetted human figures stand opposite a glowing digital brain, surrounded by abstract circuits and shadowy shapes

Global Tech Execs Expect Advancements in AI to Increase Security Threats

Forty-one percent of global tech executives in a recent NetApp survey said they believe advancements in AI will significantly increase security threats. The firm's second annual Data Complexity Report points to 2025 as "AI's make or break year."

computer with a red warning icon on its screen, surrounded by digital grids, glowing neural network patterns, and a holographic brain

Report Highlights Security Risks of Open Source AI

In these days of rampant ransomware and other cybersecurity exploits, security is paramount to both proprietary and open source AI approaches — and here the open source movement might be susceptible to some inherent drawbacks, such as use of possibly insecure code from unknown sources.

sleek fishing hook with a translucent email icon hanging from it

Report Identifies Rise in Phishing-as-a-Service Attacks

Cybersecurity researchers at Trustwave are warning about a surge in malicious e-mail campaigns leveraging Rockstar 2FA, a phishing-as-a-service (PhaaS) toolkit designed to steal Microsoft 365 credentials.

metallic padlock with a glowing keyhole, set on a dark gradient background with a faint digital grid and blue-green highlights

Microsoft Announces Security Updates as Part of Secure Future Initiative

Microsoft has announced a handful of new security tools and updates, which the company said adhere to its Secure Future Initiative, a set of three core tenets emphasizing "secure by design, secure by default and secure operations."

glowing AI symbol integrated into a stylized cloud icon, surrounded by interconnected digital nodes and translucent security shields, set against a gradient white-to-blue background with grid lines and abstract risk charts

Cloud Security Alliance Report Plots Path to Trustworthy AI

A new report from the Cloud Security Alliance highlights the need for AI audits that extend beyond regulatory compliance, and advocates for a risk-based, comprehensive methodology designed to foster trust in rapidly evolving intelligent systems.

Man wearing headset working on a computer

Internet2: Network Routing Security and RPKI Adoption in Research and Education

We ask James Deaton, vice president of network services, about Internet2's initiatives and leadership efforts to promote routing security and RPKI adoption in research and higher education networks.

abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

Education Sector a Top Target for Mobile Malware Attacks

Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.

network of transparent cloud icons, each containing a security symbol like a lock or shield

Okta, OpenID Foundation Propose New Identity Security Standard

Okta and the OpenID Foundation have announced the formation of the IPSIE Working Group — with the acronym standing for Interoperability Profiling for Secure Identity in the Enterprise — dedicated to a new identity security standard for Software-as-a-Service (SaaS) applications.

Two shadowy figures sit at computers with glowing screens, surrounded by floating digital codes in a dark, high-tech environment

Reports Note Increasing Threat of Nation-State-Sponsored Cyber Attacks

A bevy of new cybersecurity reports point to the continuing problem of nation-state-sponsored threat actors. The primary culprits have long been Russia, China, Iran, and North Korea, which all show up in recently published reports from Microsoft, IBM, Tenable, and Fortinet.