Security & Privacy


a digital lock symbol is cracked and breaking apart into dollar signs

Ransomware Costs Schools Nearly $550,000 per Day of Downtime

New data from cybersecurity research firm Comparitech quantifies the damage caused by ransomware attacks on educational institutions.

digital network grid shows lines and nodes, with one node highlighted in red

3 in 4 Education Institutions Have Identified a Cyber Attack on Their Infrastructure in the Past Year

Seventy-seven percent of institutions across K-12 and higher education have uncovered a cyber attack on their infrastructure within the past 12 months, according to a new survey from cybersecurity company Netwrix.

cloud icon connected to a data network with an alert symbol (a triangle with an exclamation mark) overlaying the cloud

U.S. Department of Commerce Proposes Mandatory Reporting Requirement for AI, Cloud Providers

This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.

translucent lock composed of interconnected nodes and circuits at the center

Cloud Security Alliance: Best Practices for Securing AI Systems

The Cloud Security Alliance (CSA), a not-for-profit organization whose mission statement is defining and raising awareness of best practices to help ensure a secure cloud computing environment, has released a new report offering guidance on securing systems that leverage large language models (LLMs) to address business challenges.

abstract image representing multifactor authentication with three security layers: a fingerprint, a shield, and a key

Mandatory Multifactor Authentication Coming to Azure in October

Microsoft will soon require multifactor authentication (MFA) for all Azure sign-ins.

abstract illustration of a biometric face scan, featuring a minimalistic wireframe outline of a human face

Microsoft Releases Face Check Identity Verification for Enterprise Use

Face Check with Microsoft Entra Verified ID, a consent-based method used to confirm a person's identity, is now available in general release.

illustration of a VPN network with interconnected nodes and lines forming a minimalist network structure

Report: Increasing Number of Vulnerabilities in OpenVPN

OpenVPN, a popular open source virtual private network (VPN) system integrated into millions of routers, firmware, PCs, mobile devices and other smart devices, is leaving users open to a growing list of threats, according to a new report from Microsoft.

abstract image depicting a cyber attack simulation

Cloud Security Alliance Report Explores Potential of AI for 'Offensive Security'

A new paper examines how advanced AI can help perform adversarial testing with red/black teams and provides recommendations for organizations to do just that.

minimalist illustration conveying security threats, featuring a blue gradient cloud with a metallic silver padlock at its center

Human Factor Moves to No. 1 Cloud Threat in Cloud Security Alliance Report

The top cybersecurity threat in the cloud has changed from a couple years ago, according to a new report from the Cloud Security Alliance (CSA), which provided handy mitigation strategies and suggested AI can help (or hurt).

closeup of laptop and smartphone calendars

2024 Tech Tactics in Education Conference Agenda Announced

Registration is free for this fully virtual Sept. 25 event, focused on "Building the Future-Ready Institution" in K-12 and higher education.