Main Nav

Search results

Showing 11 - 20 of 80 Results

Sort by:

Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013

Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…

Touch ID: Net Benefit or Net Loss?
October 8, 2013

Guest Blogger: Joshua Wright , @joswr1ght With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the …

8 Mobile Device Security Steps
October 1, 2013 | A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps

Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …

Graduating to Mobility through E-Learning
October 17, 2013 | A session at the EDUCAUSE Annual Conference 2013

With the exponential growth of mobile devices and tablets entering the classroom across educational institutions, learning is evolving. This session will provide attendees with strategies on how in…

Sensitive Regulated Data: Permitted and Restricted Uses
April 2, 2013

The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted us…

AT&T Splits Phones into Work and Personal Partitions, on any Carrier
June 15, 2012

AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology…

7 Ways BYOD Could Get You Sued
July 18, 2012

The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012

Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT
July 11, 2012

Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in e…

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.