The Identity Theft Risk Profile of NBA and NFL Draft Prospects

Does making a draft list increase the risk of identity theft? 

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

6 months after facing a cyberattack, JLR releases an update. 

Why it’s Time to Move on From Legacy Access Control Systems

The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up. 

New Malware Campaign Targeting Hospitality Sector

Security leaders discuss a new campaign targeting hospitality. 

Is Email the Entry Point to a Well-Rounded Disinformation Attack?

Email has always been the nervous system of business communication and is trusted, immediate and universal. 

Google Cloud Service Exploited in New Phishing Campaign

A phishing campaign is exploiting this Google service. 

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Artificial intelligence is reshaping instruction, cybersecurity threats are becoming more advanced, and digital tools are expanding faster than most districts can keep up with.

Compliance Theater: Why Cybersecurity’s Favorite Shakespearean Tragedy is Failing Us

IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause.

Communication Criticized in Handling of Recent Healthcare Hack

This organization’s post-breach communication concerned some individuals. 

Agentic AI Security Is Complicated, and the Hyper-Scalers Know It

3 best practices for secure and efficient Agentic AI adoption and use.