Security & Privacy


interconnected blocks of data

Rubrik Intros Immutable Backup for Okta Environments

Rubrik has announced Okta Recovery, extending its identity resilience platform to Okta with immutable backups and in-place recovery, while separately detailing its integration with Okta Identity Threat Protection for automated remediation.

Hand holding a stylus over a tablet with futuristic risk management icons

Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

Abstract digital background with cybernetic particles

Druva Intros MetaGraph to Advance Agentic Data Security

Druva has introduced Dru MetaGraph, a secure, tenant-specific, graph-powered metadata layer to power real-time data intelligence.

hooded figure types on a laptop, with abstract manifesto-like posters taped to the wall behind them

Hacktivism Is a Growing Threat to Higher Education

In recent years, colleges and universities have faced an evolving array of cybersecurity challenges. But one threat is showing signs of becoming both more frequent and more politically charged: hacktivism.

cybersecurity book with a shield and padlock

NIST Proposes New Cybersecurity Guidelines for AI Systems

The National Institute of Standards and Technology has unveiled plans to issue a new set of cybersecurity guidelines aimed at safeguarding artificial intelligence systems, citing rising concerns over risks tied to generative models, predictive analytics, and autonomous agents.

a cloud, an AI chip, and a padlock interconnected by circuit-like lines

Report: Attackers Increasingly Targeting Cloud, AI Systems

CrowdStrike’s 2025 Threat Hunting Report found that AI tools are being weaponized and directly targeted, while cloud intrusions surge 136% in early 2025.

three glowing stacks of tech-themed icons

Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

laptop with digital productivity and calendar symbols

September 2025 Tech Tactics in Education Conference Agenda Announced

Registration is free for this fully virtual Sept. 25 event, focused on "Overcoming Roadblocks to Innovation" in K-12 and higher education.

black analog alarm clock sits in front of a digital background featuring a glowing padlock symbol and cybersecurity icons

The Clock Is Ticking: Higher Education's Big Push Toward CMMC Compliance

With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.

laptop displaying a phishing email icon inside a browser window on the screen

Phishing Campaign Targets ED Grant Portal

Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.