8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes Security Staff April 2, 2026 Most AI chatbots are likely to assist a user in planning a violent attack. Read More
1M Impacted by University of Hawaii Cancer Center Breach Jordyn Alger March 3, 2026 The University of Hawaiʻi Cancer Center’s Epidemiology Division revealed it experienced a data breach. Read More
AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare Brian Long February 24, 2026 AI-generated manipulated images are getting easier to create, harder to detect, and faster to distribute.Read More
Understanding Breaches Before and After They Happen: What Every Organization Should Know Darryl Santry February 10, 2026 Attackers rarely need cutting-edge tools when organizations neglect basic security hygiene.Read More
Lawsuit Filed After 320,000 Impacted by Monroe University Breach Security Staff January 20, 2026 The lawsuit claims the university didn’t enact reasonable data security measures. Read More
What Can Security Leaders Learn From Prevented University Attack? Jordyn Alger December 19, 2025 Campus police were targeted in a planned university attack. Read More
Breaking Down the Security, Risk of Recent University Firing Jordyn Alger December 16, 2025 Security expert discusses the recent firing of University of Michigan coach Sherrone Moore. Read More
After Email Hacking, University Targeted By Another Breach Security Staff December 4, 2025 After experiencing an email hacking incident on Oct. 31, the University of Pennsylvania has faced another cyberattack. Read More
1.2M Individuals’ Data Stolen In University Hacking Security Staff November 4, 2025 The University of Pennsylvania experienced a cyber incident in which a series of mass emails were sent to students, parents, faculty and alumni. Read More
Transforming Higher Ed Safety and Efficiency with Cloud-Based Access Control Jake Leichtling August 11, 2025 As colleges and universities look for ways to streamline operations and better protect students and faculty, it’s clear that fragmented, manually intensive access control systems are no longer sustainable. Read More