Day: 27 December 2025
How Ransomware Has Evolved Over the Past Decade
Few cybersecurity threats have evolved as quickly or significantly over the past decade as ransomware. Wade Baker, collegiate associate professor of integrated security in the Department of Business Information Technology, is helping to advance understanding of this menace by conducting sponsored research through his Cyentia Institute think tank. Ransomware is
Read MorePhishing Attacks Become More Sophisticated and Use AI-Enabled Tools
Attackers use phishing to trick users into clicking on malicious links or downloading malware. Often, these attacks impersonate banks, online services, or even employees. They usually use a sense of urgency to exploit the recipient’s quick action. For example, they may request that the user bypass normal verification procedures in
Read MoreCloud Security Best Practices
Cloud Security includes all measures that protect data, applications and infrastructure hosted in the cloud. These include encryption and access controls that safeguard sensitive data from unauthorized access, as well as tools for monitoring cloud environments to identify vulnerabilities and other issues. Developing a strong cloud security posture starts in
Read More