-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Cloud Security [x]
- Cybersecurity (51)
- Security Management (51)
- Networking and Emerging Technologies (31)
- Cloud Computing (30)
- High-Performance Computing (HPC) (30)
- Information Technology Management and Leadership (28)
- Technology Selection (22)
- Vendor Selection (22)
- Privacy (17)
- Cloud Computing Policy (15)
- Cloud Services (15)
- Data Security (15)
- Cloud Computing Contracts (11)
- Policy and Law (9)
- Federal Policy and Law (8)
- Identity and Access Management (6)
- Mobile Security (6)
- Teaching and Learning (6)
- Distributed Computing (5)
Cloud Data Storage Solutions
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) created a Hot Topics page on Cloud Data Storage Solutions: Dropbox Security & Privacy Considerations. The topic, Cloud Data Storage Solutions: Dropbox Security & Privacy Considerations discusses issues of concern that are common to most cloud data storage services; however vendor solutions and implementations vary greatly. The following outlines an evaluation of one vendor that can easily be applied to others, such as SpiderOak, box.net, Skydrive, and CrashPlan.
- About Dropbox
- Considerations for Sharing Data
- Security Concerns and Issues
- Contractual Issues
- Recommendations
- Service References
EDUCAUSE Staff Picks
Cloud Security Debate: Cloud Now or Cloud How?, EDUCAUSE Review, December 2012.
Security Awareness and Communication in the C-Suite, EDUCAUSE Live!, October 1012.
7 Things You Should Know About Cloud Security, EDUCAUSE 7 Things You Should Know, September 2010.
Library Items on this Topic
EDUCAUSE Library Items for Cloud Security
-
Security and Privacy Considerations for Cloud Computing
-
June 2, 2011
|
A session at the EDUCAUSE Southeast Regional Conference 2011
As colleges and universities consider the strategic advantages of leveraging the cloud for storage, processing, e-mail, identity management, and other services and infrastructures, a host of compli…
-
What Campus Leaders Need to Know About Cloud Computing
-
April 14, 2011
This EDUCAUSE Executive Briefing explains "What Campus Leaders Need to Know About Cloud Computing". Cloud computing is a computing model in which technology resources are delivered o…
-
Learning Analytics: The Coming Third Wave
-
April 13, 2011
Learning analytics (LA) is the third wave of large-scale developments in instructional technology that began with the advent of the learning management system (LMS) . As a compelling diagnost…
-
Practical Strategies for Managing Risk in Cloud Computing
-
March 1, 2011
This ECAR research bulletin identifies some key principles on which to base decisions related to security assurance and compliance capabilities in cloud computing environments. It also illustrate…
-
"Bag It and Tag It": Implementing a Course-Level Learning Portfolio Using CMS-Based Tools to Document Student Learning When Teaching in Wild, Open Spaces with Cloud-Based Tools (Pilot Program/Emerging Technology)
-
February 14, 2011
|
A session at the ELI Annual Meeting 2011
As more of us adopt cloud-based tools (e.g., blogs, wikis, Google Docs, etc.) for use by students in authentic learning activities, we find ourselves without the student-produced artifacts that we …
-
Application Security in the Cloud
-
April 6, 2011
|
A session at the Security Professionals Conference 2011
Institutions are interested in applications in the cloud due to the "miracle of marginal cost." While offloading maintenance to the cloud provider and the elasticity of applications in th…
-
Do They Measure Up? Assessing the Security Posture of Third-Party Service Providers
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
In these days of outsourcing, SaaS, and clouds, higher education is increasingly turning to third parties to host institution-owned data to gain efficiencies and reduce cost. But how do we assess t…
-
Overview of the EDUCAUSE/Internet2 Information Security Guide ; or, How to Get a Virtual Workforce for Free
-
February 24, 2011
|
A session at the EDUCAUSE West/Southwest Regional Conference 2011
The Higher Education Information Security Council created the Information Security Guide as a compendium of effective security practices, organized around ISO/IEC 27002. Many institutions are s…
-
Managing Availability and Performance Risks in the Cloud: Expect the Unexpected
-
December 7, 2010
We know that the best way to avoid cloud risks is to apply sound risk management strategies before placing applications and IT services in the cloud. Some risks, however, cannot be predetermined …
-
Overview of the EDUCAUSE/Internet2 Information Security Guide, or How to Get a Virtual Workforce for Free
-
January 14, 2011
|
A session at the Mid-Atlantic Regional Conference 2011
The Higher Education Information Security Council created the Information Security Guide as a compendium of effective security practices, organized around ISO/IEC 27002. Many institutions seem to b…

















