-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (142)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (292)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (488)
- Security Management (264)
- Policy and Law (102)
- Identity and Access Management (97)
- Networking and Emerging Technologies (83)
- Intrusion Detection and Prevention (82)
- Federal Policy and Law (73)
- Information Technology Management and Leadership (73)
- Data Security (67)
- Authentication (57)
- Security Risk Assessment and Analysis (47)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (38)
- Firewalls (37)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
DNSSEC for the .edu Domain
-
April 29, 2010
The Domain Name System (DNS) was built without security, leaving Internet traffic exposed to forged DNS data, which, among other things, allows the spoofing of addresses to redirect traffic to ma…
-
Realizing the Promise of Faster, More Secure Campus Communications
-
April 13, 2010
|
A session at the Security 2010
Colleges and universities are facing difficult computer security challenges. Social networking sites, Web 2.0 applications, and high-bandwidth multimedia services have become the norm for campus co…
-
Hot Topic Discussion: Mobile Data Paranoia—Three Perspectives on Encryption
-
April 13, 2010
|
A session at the Security 2010
Emory University, the University of Alabama at Birmingham, and the University of Colorado at Boulder recently initiated projects to eliminate the threat of data leakage from lost or stolen mobile d…
-
Data Loss Prevention - Attacking the Root Cause
-
April 13, 2010
|
A session at the Security 2010
Despite many tools and solutions on the market for the past 10 years, data breaches have continued to increase. Traditional approaches of simply protecting the perimeter are not nearly enough to pr…
-
GULP-Do You Know Who Your Users Are...Really?
-
April 14, 2010
|
A session at the Security 2010
Columbia University uses the "Free Love" method of network IP management. When a machine is plugged into our network, it receives a real (not NAT-ed) IP address. Additionally, we do not u…
-
Filelocker: Simplifying Secure File Transfers
-
April 14, 2010
|
A session at the Security 2010
Purdue has developed a web-based secure file transfer program to allow the secure sharing of files among administrative, security, and research faculty and staff. Filelocker allows users to easily …
-
Linking Remote Sites with OpenVPN
-
April 14, 2010
|
A session at the Security 2010
OpenVPN is a free, open-source, multiplatform VPN client and server system. This session will discuss deploying it on commodity hardware to enable secure connection of geographically distinct netwo…
-
Mastering Puppet: Using Puppet to Centrally Manage IT Security Infrastructure
-
April 13, 2010
|
A session at the Security 2010
As our IT security infrastructure expands and becomes more complex, it can be a challenge to maintain consistent configuration and architecture across all components. Puppet is a free, open-source …
-
Cyberspace: A Matter of National Security - Sponsored by Trustwave
-
April 13, 2010
|
A session at the Security 2010
Cyberspace began as the domain of technologists and engineers, with a focus on building circuits, switches, computers, and software that could reliably sustain a new global form of communication. I…
-
Hot Topic Discussion: Application Security and Software Development Life Cycle
-
April 13, 2010
|
A session at the Security 2010
One of the weakest links in the information security chain is the application. With the explosion of the web interface within applications, cybercriminals have found more fertile ground. Implementi…

















