Security & Privacy


The First Steps of Establishing Your Cloud Security Strategy

In this guide, we'll identify some first steps you can take to establish your cloud security strategy. We'll do so by discussing the cloud security impact of individual, concrete actions featured within the CIS Critical Security Controls® (CIS Controls®) and the CIS Benchmarks™.

school IT team battling cybersecurity threats

Today's K-12 Cybersecurity Threats — And How to Combat Them

An analysis of the cybersecurity landscape for education institutions and tips on how defenders can comfortably face new and emerging threats.

industry group working on open source AI security

Industry Group Tackles AI Safety and Security

Tech giants Google, Microsoft, Amazon, OpenAI and others have formed a new industry group aimed at promoting AI safety and security standards.

close-up view of a heavily barricaded metal door with a large

Kaspersky Shuts Down U.S. Operations

Security software company Kaspersky has announced it is closing down its United States operations. The news comes just days before a federal ban on sales of its products was set to take effect, due to concerns about cyber espionage.

simplified, abstract illustration focusing on the negative side of generative AI misuse, balancing the concepts of cybersecurity and human impact

Researchers Provide Taxonomy of Gen AI Misuse

To clarify the potential risks of GenAI and provide "a concrete understanding of how GenAI models are specifically exploited or abused in practice, including the tactics employed to inflict harm," a group of researchers from Google DeepMind, Jigsaw, and Google.org recently published a paper entitled, "Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data."

Human Error Remains the Leading Cause of Cloud Data Breaches

Human error is still one of the biggest threats to cloud security, despite all the technology bells and whistles and alerts and services out there, from multi-factor authentication, to social engineering training, to enterprise-wide integrated cybersecurity platforms, and more.

Report: Generative AI Agents Can Exploit Cybersecurity Vulnerabilities

A new study from the University of Illinois Urbana-Champaign (UIUC) found that large language model agents can autonomously exploit real-world cybersecurity vulnerabilities, raising critical concerns about the widespread deployment and security of these advanced AI systems.

Feds Ban Kaspersky Sales, Citing 'Unacceptable' Security Risk

Effective this fall, the United States government is banning all sales of Kaspersky Lab software to businesses and private citizens due to concerns about cyber espionage.

secure lock symbol intertwined with a school building

FCC Cybersecurity Funding Pilot Moves Forward

The Federal Communications Commission has adopted a $200 million, three-year program to help schools and libraries purchase eligible cybersecurity services and equipment — and to gather data on how well the products and services address cyber threats.

Only Half of Ransomware-Compromised Data Will Be Recovered, According to Survey Report

Organizations are vulnerable to substantial data loss and negative business impact from a ransomware attack, according to a recent Veeam Software survey.