Cybersecurity


Articles

  • Training the Next Generation of Space Cybersecurity Experts

    CT asked Scott Shackelford, Indiana University professor of law and director of the Ostrom Workshop Program on Cybersecurity and Internet Governance, about the possible emergence of space cybersecurity as a separate field that would support changing practices and foster future space cybersecurity leaders.

  • Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • Study: Data Privacy a Top Concern as Orgs Scale Up AI Agents

    As organizations race to integrate AI agents into their cloud operations and business workflows, they face a crucial reality: while enthusiasm is high, major adoption barriers remain, according to a new Cloudera report. Chief among them is the challenge of safeguarding sensitive data.

  • Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.


Podcasts


Webcasts

  • Getting Identity Right: Why Flexibility Is Key to a Modern IAM Solution

    In this fireside chat, Campus Technology Editor in Chief Rhea Kelly will speak with Unicon's Paul Spaude, IAM Software Engineer & Consultant, and David Mendez, Managing Director, Critical Infrastructure, about key considerations for implementing a modern identity solution, differences between open source and proprietary products, and what it takes to move a modernized identity solution forward on campus.

  • Navigating Modern Data Protection and Privacy in Education

    Watch today to gain valuable insights and actionable strategies to protect your organization's sensitive information!


Whitepapers