Quantcast
Channel: EDUCAUSE | Mobile Security
Browsing latest articles
Browse All 48 View Live

AT&T Splits Phones into Work and Personal Partitions, on any Carrier

AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology that...

View Article



Sensitive Regulated Data: Permitted and Restricted Uses

The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted uses of...

View Article

Image may be NSFW.
Clik here to view.

January 2013 is Data Privacy Month! Free Webinars and Easy Ways to Increase...

Data Privacy Month is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone's priority....

View Article

Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in...

The authors examine several campus issues lying at the intersection of privacy, security, and compliance and provide insight for institutional leaders planning strategic directions.read more

View Article

Executive Summary: BYOD and Consumerization of IT in Higher Education...

"What excites IT leaders in higher education most about BYOE are opportunities to diversify and expand the teaching and learning environment, while the greatest challenges are issues that pertain to...

View Article


Containing the Security Threat of Mobile Apps in Higher Ed

Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus.With a growing number of new offerings touching enterprise data, the time has come...

View Article

What Does BYOE Mean for IT?: IT Leader Roundtable

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brought only a...

View Article

Getting Schooled on BYOD at Utah Valley University: Lessons Learned

This session will focus on how Utah Valley University overcame significant challenges to create a BYOD environment that integrates mobility into the university experience for more than 40,000 students...

View Article


Graduating to Mobility through E-Learning

With the exponential growth of mobile devices and tablets entering the classroom across educational institutions, learning is evolving. This session will provide attendees with strategies on how...

View Article


8 Mobile Device Security Steps

Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most...

View Article

Image may be NSFW.
Clik here to view.

Touch ID: Net Benefit or Net Loss?

Guest Blogger: Joshua Wright, @joswr1ghtWith the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the iPhone, and for...

View Article

Measuring the Effectiveness of Security Awareness Programs

Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and measuring their...

View Article

HTML5 Security

HTML5 is an emerging technology with broad implications for mobile application development and delivery. A number of new security-related features are contained in the HTML5 specification that can be...

View Article


Sensitive Information Is Pouring through the Floodgates

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? As...

View Article

Who Moved My Office? The Evolving Role of the CISO

In a fast-paced world of innovation, mobility, outsourcing, and social technology, today's chief information security officers must possess a blend of warrior-like technical skills combined with strong...

View Article


The Security Dilemma of Desktop Access to ERP Systems

With information security shifting from the data center to the desktop, organizations must have an aggressive patch-management program — though implementing one is challenging due to complicated...

View Article

Citizen Developers in UPenn's Nanofab Lab

Three lab engineers with no programming experience built a lab management app for the University of Pennsylvania's Quattrone Nanofabrication Facility in three weeks.Using cloud platforms with intuitive...

View Article


The Top 3 Strategic Information Security Issues

The EDUCAUSE Top 10 IT Issues list presents a yearly look at the issues facing higher education institutions. This year, the EDUCAUSE IT Issues Panel invited the Higher Education Information Security...

View Article

OAuth: ECAR-WG Technology Spotlight

OAuth is a specification that allows a third-party site to obtain information about a user from a second sitewithout requiring the user to provide access credentials to the third party. OAuth, which is...

View Article

2015 Strategic Information Security Issues Infographic

Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by the...

View Article

Designing IT Guidelines for Global Travel

Programs shuttling students, faculty, and staff to foreign destinations challenge university IT departments especially, in that foreign locations and governments can test established IT policies and...

View Article


You're an Important Piece of the Puzzle

In case you haven't heard (perhaps you've been working remotely on the moon), cybersecurity has become a huge issue for all of us. The security professionals tasked with keeping institutional networks...

View Article


Creating a Culture of Cybersecurity at Work

Security awareness is foundational to creating a culture of cybersecurity. While technologies are evolving to stop advanced attacks, the human element is essential to protecting data in the workplace....

View Article

The Internet Is Changing the Way We Remember

Convenient access to the Internet might make remembering mundane information a thing of the past. Just make sure you can find that information securely, by securing your Internet-enabled devices and...

View Article

Fast-Forward: Shadow IT

The following is a guest post in a new blog series by Chris Markman, Academic Technology Specialist at Clark University, where he presses the "fast-forward button" on Hacker Conference videos to give...

View Article

Browsing latest articles
Browse All 48 View Live




Latest Images