A recent Varonis data security report notes that excessive permissions and AI-driven risks are leaving cloud environments dangerously exposed.
Here are six good starting points for K-12 districts that want to improve their cybersecurity mitigation strategies and take a more proactive approach to mitigating risk.
A recent report from Microsoft reinforces warns of the critical role Active Directory (AD) domain controllers play in large-scale ransomware attacks, aligning with U.S. government advisories on the persistent threat of AD compromise.
Global IT leaders are planning to spend more on generative artificial intelligence than cybersecurity in 2025, according to new research by Amazon Web Services (AWS).
A new threat landscape report from Fortinet points to new cloud vulnerabilities. According to the company's 2025 Global Threat Landscape Report, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.
As organizations race to integrate AI agents into their cloud operations and workflows, they face a crucial reality: while enthusiasm is high, major adoption barriers remain, according to a new Cloudera report. Chief among them is the challenge of safeguarding sensitive data.
Microsoft has announced major cybersecurity advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.
CoSN, the professional association for K-12 ed tech leaders, has launched a national advocacy campaign urging Congress to maintain federal support for cybersecurity assistance in K-12 education.
K12TechPro, a community for technology professionals in education, has introduced the K12TechPro Cybersecurity Hub, a collection of resources designed to bolster cybersecurity in K-12 education.
A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.