Main Nav

Search results

Showing 1 - 10 of 87 Results

Sort by:

You're an Important Piece of the Puzzle
October 8, 2015

In case you haven't heard (perhaps you've been working remotely on the moon), cybersecurity has become a huge issue for all of us. The security professionals tasked with keeping institu…

Who Moved My Office? The Evolving Role of the CISO
June 19, 2014 | A session at the EDUCAUSE LIVE! - Who Moved My Office? The Evolving Role of the CISO

In a fast-paced world of innovation, mobility, outsourcing, and social technology, today's chief information security officers must possess a blend of warrior-like technical skills combined …

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

Tune In April 21: Privacy Attacks and Defenses
April 14, 2011

Our online privacy seems to be under assault from all sides: by commercial organizations, by the government, by search engines and ISPs, and even by our cell phones—not to mention by crimi…

Touch ID: Net Benefit or Net Loss?
October 8, 2013

Guest Blogger: Joshua Wright , @joswr1ght With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the …

Top-Ten IT Issues in Higher Education: 2011 Current Issues Survey Results
June 1, 2011

In this year’s Current Issues Survey, mobile computing debuts as a top-ten higher education IT issue critical for strategic success and emerging across all issues is the need for IT leaders to…

Tools, Techniques, and Practices: Lightning Round
May 16, 2012 | A session at the Security Professionals Conference 2012

Discover the tools, techniques, and practices that are already working in higher education and how you can adapt these at your institutions. Georgia Tech—Fighting Backlinks: Identifying and …

The Top 3 Strategic Information Security Issues
January 12, 2015

Joanna Lyn Grama is IT GRC and Cybersecurity Program Director, EDUCAUSE. Valerie Vogel is Program Manager, EDUCAUSE. Visit the EDUCAUSE top 10 IT issues web page for additional resourc…

The Security Dilemma of Desktop Access to ERP Systems
August 11, 2014

Key Takeaways With information security shifting from the data center to the desktop , organizations must have an aggressive patch-management program — though implementing…

The Internet Is Changing the Way We Remember
October 22, 2015

Convenient access to the Internet might make remembering mundane information a thing of the past. Just make sure you can find that information securely, by securing your Internet-enabled devices …