Main Nav

Search results

Showing 11 - 20 of 87 Results

Sort by:

The Security Dilemma of Desktop Access to ERP Systems
August 11, 2014

Key Takeaways With information security shifting from the data center to the desktop , organizations must have an aggressive patch-management program — though implementing…

Measuring the Effectiveness of Security Awareness Programs
December 10, 2013

Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and mea…

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

Containing the Security Threat of Mobile Apps in Higher Ed
May 6, 2013

Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…

Executive Summary: BYOD and Consumerization of IT in Higher Education Research, 2013
April 1, 2013

"What excites IT leaders in higher education most about BYOE are opportunities to diversify and expand the teaching and learning environment, while the greatest challenges are issues th…

Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013

Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…

Sensitive Regulated Data: Permitted and Restricted Uses
April 2, 2013

The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted us…

AT&T Splits Phones into Work and Personal Partitions, on any Carrier
June 15, 2012

AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology…

7 Ways BYOD Could Get You Sued
July 18, 2012

The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…