Security & Privacy


glowing AI symbol integrated into a stylized cloud icon, surrounded by interconnected digital nodes and translucent security shields, set against a gradient white-to-blue background with grid lines and abstract risk charts

Cloud Security Alliance Report Plots Path to Trustworthy AI

A new report from the Cloud Security Alliance highlights the need for AI audits that extend beyond regulatory compliance, and advocates for a risk-based, comprehensive methodology designed to foster trust in rapidly evolving intelligent systems.

Man wearing headset working on a computer

Internet2: Network Routing Security and RPKI Adoption in Research and Education

We ask James Deaton, vice president of network services, about Internet2's initiatives and leadership efforts to promote routing security and RPKI adoption in research and higher education networks.

abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

Education Sector a Top Target for Mobile Malware Attacks

Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.

network of transparent cloud icons, each containing a security symbol like a lock or shield

Okta, OpenID Foundation Propose New Identity Security Standard

Okta and the OpenID Foundation have announced the formation of the IPSIE Working Group — with the acronym standing for Interoperability Profiling for Secure Identity in the Enterprise — dedicated to a new identity security standard for Software-as-a-Service (SaaS) applications.

Two shadowy figures sit at computers with glowing screens, surrounded by floating digital codes in a dark, high-tech environment

Reports Note Increasing Threat of Nation-State-Sponsored Cyber Attacks

A bevy of new cybersecurity reports point to the continuing problem of nation-state-sponsored threat actors. The primary culprits have long been Russia, China, Iran, and North Korea, which all show up in recently published reports from Microsoft, IBM, Tenable, and Fortinet.

digital brain made of blue circuitry on the left and a shield with a glowing lock on the right, set against a dark background with fading binary code

AI Dominates Key Technologies and Practices in Cybersecurity and Privacy

AI governance, AI-enabled workforce expansion, and AI-supported cybersecurity training are three of the six key technologies and practices anticipated to have a significant impact on the future of cybersecurity and privacy in higher education, according to the latest Cybersecurity and Privacy edition of the Educause Horizon Report.

Abstract geometric shapes connected by binary code and circuit patterns

Rubrik-Okta Integration Offers AI-Driven Identity Threat Protection

Cybersecurity companies Rubrik and Okta are partnering on a new AI-powered identity threat protection solution.

wind turbine and solar panels with glowing accents on the left and a digital shield surrounded by binary code on the right

Educause Horizon Report: Sustainability Pressures Lead to Increased Cybersecurity Risks

Educause recently released the 2024 Cybersecurity and Privacy Edition of its Horizon Report series, forecasting key trends, technologies, and practices shaping the future of cybersecurity and privacy in higher education.

A glowing blue shield at the center, surrounded by digital lines and red dots

Cohesity Adds CrowdStrike Threat Intelligence to Data Protection Platform

Data security provider Cohesity has integrated CrowdStrike threat intelligence to its flagship data protection platform.

a digital lock symbol is cracked and breaking apart into dollar signs

Ransomware Costs Schools Nearly $550,000 per Day of Downtime

New data from cybersecurity research firm Comparitech quantifies the damage caused by ransomware attacks on educational institutions.