Main Nav

Latest Security News

March 19, 2015 | David Sherry
The Higher Education Information Security Council (HEISC) Governance, Risk, and Compliance (GRC) Working Group has developed a series of security translation papers for specific campus audiences. These papers highlight key security program points for procurement staff, treasury operations staff,...
February 25, 2015 | Lisa Ho
Lisa Ho, Campus Privacy Officer, University of California, BerkeleyIt's common to see privacy pitted against security in the form of the question, "How much privacy are we willing to give up for security?" Some call the security vs. privacy debate a false choice and suggest the debate...
February 12, 2015 | Michael Corn
Michael Corn, Deputy CIO, Brandeis UniversityThe floodgates are opening on organizational analytics and I worry that privacy is going to drown in the deluge. By organizational analytics, I'm referring to using the techniques of data mining and big data to look at ourselves, both operationally...
February 10, 2015 | Tracy Mitrano
Tracy Mitrano and Jacob CunninghamTracy Mitrano, Former Director of IT Policy and Law, Cornell University; and Jake Cunningham, Information Security Officer, University of Massachusetts Amherst
February 4, 2015 | Geoffrey S. Nathan
Or, How Technology Helps Your Friendly Neighborhood Policeman Violate Your Privacy in New and Innovative WaysGeoffrey S. Nathan, Faculty Liaison for Computing and Information Technology, Wayne State UniversityWe already know that our government (and other people's governments) like to collect...
February 3, 2015 | Valerie M. Vogel
By Celina StewartCelina Stewart is an undergraduate student in International Relations at Brown University."We should hack an application," a fellow teaching assistant brainstormed to our Cybersecurity and International Relations Teaching Staff at Brown University. His suggestion to hack a...

@HEISCOUNCIL