Security & Privacy


abstract illustration of a biometric face scan, featuring a minimalistic wireframe outline of a human face

Microsoft Face Check Identity Verification Now Available for Enterprise Use

Microsoft has announced the general release of Face Check with Microsoft Entra Verified ID, a consent-based method used to confirm a person's identity.

illustration of a VPN network with interconnected nodes and lines forming a minimalist network structure

Report Finds Increasing Number of Vulnerabilities in OpenVPN

OpenVPN, an open source virtual private network (VPN) system integrated into millions of routers, firmware, PCs, mobile devices and other smart devices, is leaving users open to a growing list of threats, according to a recent report from Microsoft.

abstract image depicting a cyber attack simulation

Cloud Security Alliance Issues Recommendations on Using AI for 'Offensive Security'

A new report examines how advanced AI can help perform adversarial testing with red/black teams and provides recommendations for organizations to do just that.

minimalist illustration conveying security threats, featuring a blue gradient cloud with a metallic silver padlock at its center

Human Factor Moves to Top Cloud Threat in Cloud Security Alliance Report

The No. 1 cybersecurity threat in the cloud has changed from a couple years ago, according to a new report from the Cloud Security Alliance (CSA), which provided handy mitigation strategies and suggested AI can help (or hurt).

closeup of laptop and smartphone calendars

2024 Tech Tactics in Education Conference Agenda Announced

Registration is free for this fully virtual Sept. 25 event, focused on "Building the Future-Ready Institution" in K-12 and higher education.

The First Steps of Establishing Your Cloud Security Strategy

In this guide, we'll identify some first steps you can take to establish your cloud security strategy. We'll do so by discussing the cloud security impact of individual, concrete actions featured within the CIS Critical Security Controls® (CIS Controls®) and the CIS Benchmarks™.

school IT team battling cybersecurity threats

Today's K-12 Cybersecurity Threats — And How to Combat Them

An analysis of the cybersecurity landscape for education institutions and tips on how defenders can comfortably face new and emerging threats.

industry group working on open source AI security

Industry Group Tackles AI Safety and Security

Tech giants Google, Microsoft, Amazon, OpenAI and others have formed a new industry group aimed at promoting AI safety and security standards.

close-up view of a heavily barricaded metal door with a large

Kaspersky Shuts Down U.S. Operations

Security software company Kaspersky has announced it is closing down its United States operations. The news comes just days before a federal ban on sales of its products was set to take effect, due to concerns about cyber espionage.

simplified, abstract illustration focusing on the negative side of generative AI misuse, balancing the concepts of cybersecurity and human impact

Researchers Provide Taxonomy of Gen AI Misuse

To clarify the potential risks of GenAI and provide "a concrete understanding of how GenAI models are specifically exploited or abused in practice, including the tactics employed to inflict harm," a group of researchers from Google DeepMind, Jigsaw, and Google.org recently published a paper entitled, "Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data."