AT&T Splits Phones into Work and Personal Partitions, on any Carrier
AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology that...
View ArticleSensitive Regulated Data: Permitted and Restricted Uses
The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted uses of...
View ArticleJanuary 2013 is Data Privacy Month! Free Webinars and Easy Ways to Increase...
Data Privacy Month is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone's priority....
View ArticlePrivacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in...
The authors examine several campus issues lying at the intersection of privacy, security, and compliance and provide insight for institutional leaders planning strategic directions.read more
View ArticleExecutive Summary: BYOD and Consumerization of IT in Higher Education...
"What excites IT leaders in higher education most about BYOE are opportunities to diversify and expand the teaching and learning environment, while the greatest challenges are issues that pertain to...
View ArticleContaining the Security Threat of Mobile Apps in Higher Ed
Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus.With a growing number of new offerings touching enterprise data, the time has come...
View ArticleWhat Does BYOE Mean for IT?: IT Leader Roundtable
The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brought only a...
View ArticleGetting Schooled on BYOD at Utah Valley University: Lessons Learned
This session will focus on how Utah Valley University overcame significant challenges to create a BYOD environment that integrates mobility into the university experience for more than 40,000 students...
View ArticleGraduating to Mobility through E-Learning
With the exponential growth of mobile devices and tablets entering the classroom across educational institutions, learning is evolving. This session will provide attendees with strategies on how...
View Article8 Mobile Device Security Steps
Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most...
View ArticleTouch ID: Net Benefit or Net Loss?
Guest Blogger: Joshua Wright, @joswr1ghtWith the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the iPhone, and for...
View ArticleMeasuring the Effectiveness of Security Awareness Programs
Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and measuring their...
View ArticleHTML5 Security
HTML5 is an emerging technology with broad implications for mobile application development and delivery. A number of new security-related features are contained in the HTML5 specification that can be...
View ArticleSensitive Information Is Pouring through the Floodgates
How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? As...
View ArticleWho Moved My Office? The Evolving Role of the CISO
In a fast-paced world of innovation, mobility, outsourcing, and social technology, today's chief information security officers must possess a blend of warrior-like technical skills combined with strong...
View ArticleThe Security Dilemma of Desktop Access to ERP Systems
With information security shifting from the data center to the desktop, organizations must have an aggressive patch-management program — though implementing one is challenging due to complicated...
View ArticleCitizen Developers in UPenn's Nanofab Lab
Three lab engineers with no programming experience built a lab management app for the University of Pennsylvania's Quattrone Nanofabrication Facility in three weeks.Using cloud platforms with intuitive...
View ArticleThe Top 3 Strategic Information Security Issues
The EDUCAUSE Top 10 IT Issues list presents a yearly look at the issues facing higher education institutions. This year, the EDUCAUSE IT Issues Panel invited the Higher Education Information Security...
View ArticleOAuth: ECAR-WG Technology Spotlight
OAuth is a specification that allows a third-party site to obtain information about a user from a second sitewithout requiring the user to provide access credentials to the third party. OAuth, which is...
View Article2015 Strategic Information Security Issues Infographic
Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by the...
View ArticleDesigning IT Guidelines for Global Travel
Programs shuttling students, faculty, and staff to foreign destinations challenge university IT departments especially, in that foreign locations and governments can test established IT policies and...
View ArticleYou're an Important Piece of the Puzzle
In case you haven't heard (perhaps you've been working remotely on the moon), cybersecurity has become a huge issue for all of us. The security professionals tasked with keeping institutional networks...
View ArticleCreating a Culture of Cybersecurity at Work
Security awareness is foundational to creating a culture of cybersecurity. While technologies are evolving to stop advanced attacks, the human element is essential to protecting data in the workplace....
View ArticleThe Internet Is Changing the Way We Remember
Convenient access to the Internet might make remembering mundane information a thing of the past. Just make sure you can find that information securely, by securing your Internet-enabled devices and...
View ArticleFast-Forward: Shadow IT
The following is a guest post in a new blog series by Chris Markman, Academic Technology Specialist at Clark University, where he presses the "fast-forward button" on Hacker Conference videos to give...
View Article
More Pages to Explore .....