Cybersecurity


Articles

  • Report Highlights Security Risks of Open Source AI

    computer with a red warning icon on its screen, surrounded by digital grids, glowing neural network patterns, and a holographic brain

    In these days of rampant ransomware and other cybersecurity exploits, security is paramount to both proprietary and open source AI approaches — and here the open source movement might be susceptible to some inherent drawbacks, such as use of possibly insecure code from unknown sources.

  • Report Identifies Rise in Phishing-as-a-Service Attacks

    Cybersecurity researchers at Trustwave are warning about a surge in malicious e-mail campaigns leveraging Rockstar 2FA, a phishing-as-a-service (PhaaS) toolkit designed to steal Microsoft 365 credentials.

  • Microsoft Announces Security Updates as Part of Secure Future Initiative

    Microsoft has announced a handful of new security tools and updates, which the company said adhere to its Secure Future Initiative, a set of three core tenets emphasizing "secure by design, secure by default and secure operations."

  • Cloud Security Alliance Report Plots Path to Trustworthy AI

    A new report from the Cloud Security Alliance highlights the need for AI audits that extend beyond regulatory compliance, and advocates for a risk-based, comprehensive methodology designed to foster trust in rapidly evolving intelligent systems.


Podcasts

  • A Security Operations Center Powered by Students

    The University of South Carolina Aiken recently found a creative way to staff a new security operations center — and give students hands-on cybersecurity training at the same time. We spoke with Ernest Pringle, vice chancellor for IT and CIO at USC Aiken, about creating a student-led SOC, helping students put cybersecurity theory into practice, forging regional cybersecurity partnerships, and more.

  • Balancing Data Insight with Data Governance, Privacy, and Transparency

    As VP for information technology and CIO at the University of Michigan, Ravi Pendse is committed to fostering a robust data culture that democratizes the use of data to inform decision-making. At the center of that culture is transparency: making sure students, faculty, and staff know exactly what types of data are collected, and how that data is stored, accessed, managed, and shared. Here, we talk about creating a data-aware, privacy-aware ecosystem, data governance challenges, making data visible to students, and more.


Webcasts

  • Getting Identity Right: Why Flexibility Is Key to a Modern IAM Solution

    In this fireside chat, Campus Technology Editor in Chief Rhea Kelly will speak with Unicon's Paul Spaude, IAM Software Engineer & Consultant, and David Mendez, Managing Director, Critical Infrastructure, about key considerations for implementing a modern identity solution, differences between open source and proprietary products, and what it takes to move a modernized identity solution forward on campus.

  • Navigating Modern Data Protection and Privacy in Education

    Watch today to gain valuable insights and actionable strategies to protect your organization's sensitive information!


Whitepapers

  • Keeping the Faith in the Cloud

    Download to discover efficient and affordable solutions available for cloud-based backup and recovery essentials, as well as surveillance, multimedia storage and nascent AI/ML applications or training models!

  • From Complexity to Clarity: Securing Cloud Environments in Higher Education

    The proliferation of AI and cloud-native tools alongside ‘shadow’ cloud deployments bring the importance of unified visibility and context clearly into focus. Download this checklist today to learn more!

  • 7 Key Considerations for Modernizing Identity Management in Higher Education

    Inter-institutional collaboration, cloud computing, online/distance education, teleworking and portable computing, federation, access from anywhere at any time, and many other business needs are challenging institutions of higher education to adapt or rebuild their Identity and Access Management (IAM) infrastructures.