-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Filter by type
- Podcasts (3)
- Blogs (3)
- Articles, Briefs, Papers, and Reports (144)
- Blogs and Wikis (3)
- Certification, Education, Training and Tutorials (4)
- Effective Practices (13)
- Government Documents, Laws, Testimonies or Reports (6)
- Infographics (1)
- Plans and Guidelines (5)
- Policies and Procedures (3)
- Presentations and Seminars (296)
- RFPs (1)
- Surveys (5)
- Tools (1)
- Videos (1)
- Web Sites (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Network Security and Applications [x]
- Cybersecurity (494)
- Security Management (270)
- Policy and Law (103)
- Identity and Access Management (97)
- Intrusion Detection and Prevention (87)
- Networking and Emerging Technologies (83)
- Information Technology Management and Leadership (75)
- Federal Policy and Law (74)
- Data Security (69)
- Authentication (57)
- Security Risk Assessment and Analysis (48)
- Encryption (46)
- Security Awareness (40)
- Information Systems and Services (39)
- Firewalls (38)
- Campus Policy and Law (35)
- Incident Handling and Response (35)
- Campus Policies (34)
- Network Infrastructure and Equipment (34)
EDUCAUSE Library Items for Network Security and Applications
-
GULP-Do You Know Who Your Users Are...Really?
-
April 14, 2010
|
A session at the Security 2010
Columbia University uses the "Free Love" method of network IP management. When a machine is plugged into our network, it receives a real (not NAT-ed) IP address. Additionally, we do not u…
-
Filelocker: Simplifying Secure File Transfers
-
April 14, 2010
|
A session at the Security 2010
Purdue has developed a web-based secure file transfer program to allow the secure sharing of files among administrative, security, and research faculty and staff. Filelocker allows users to easily …
-
Linking Remote Sites with OpenVPN
-
April 14, 2010
|
A session at the Security 2010
OpenVPN is a free, open-source, multiplatform VPN client and server system. This session will discuss deploying it on commodity hardware to enable secure connection of geographically distinct netwo…
-
Mastering Puppet: Using Puppet to Centrally Manage IT Security Infrastructure
-
April 13, 2010
|
A session at the Security 2010
As our IT security infrastructure expands and becomes more complex, it can be a challenge to maintain consistent configuration and architecture across all components. Puppet is a free, open-source …
-
Cyberspace: A Matter of National Security - Sponsored by Trustwave
-
April 13, 2010
|
A session at the Security 2010
Cyberspace began as the domain of technologists and engineers, with a focus on building circuits, switches, computers, and software that could reliably sustain a new global form of communication. I…
-
Hot Topic Discussion: Application Security and Software Development Life Cycle
-
April 13, 2010
|
A session at the Security 2010
One of the weakest links in the information security chain is the application. With the explosion of the web interface within applications, cybercriminals have found more fertile ground. Implementi…
-
2009 Cybersecurity Summit Report
-
February 26, 2010
The 2009 Cybersecurity Summit was held September 14–15, 2009, in Arlington, Virginia. The purpose of this forum was to bring together stakeholders to establish and maintain collaborative effort…
-
Higher Education Information Security Council 2012–2013 Strategic Plan
-
February 24, 2012
The HEISC mission is to improve information security, data protection, and privacy programs across the higher education sector through its working groups of volunteers and professional EDUCAUSE s…
-
7 Things You Should Know About DNSSEC
-
January 15, 2010
The Domain Name System (DNS) uses a distributed network of name servers to translate text-based web addresses into IP addresses, directing Internet traffic to proper servers. DNS was built withou…
-
Complex Systems, Simplified Operations
-
December 22, 2009
Key Takeaways As organizations adopt a decentralized model based on distributed systems with a wide variety of configurations, staffing the operations center with personnel possessing the n…

















