Main Nav

Search results

Showing 21 - 30 of 87 Results

Sort by:

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012

Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

Rolling Out a BYOD (Bring Your Own Device) Program
June 5, 2012

Use of personally owned devices continues to grow on campuses. If we don’t support these devices , community members will find their own way to support them, which could put our networks…

Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT
July 11, 2012

Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in e…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

HTML5 Security
May 7, 2014 | A session at the Security Professionals Conference

HTML5 is an emerging technology with broad implications for mobile application development and delivery. A number of new security-related features are contained in the HTML5 specification that ca…

Multiple Devices and Platforms: Institutional Strategies
May 17, 2012

This CNI’s Executive Roundtable on multiple devices and platforms discussed institutional strategies concerning BYOD. Faculty, staff, and students in our institutions continue to use laptops a…

8 Mobile Device Security Steps
October 1, 2013 | A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps

Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …

Podcast: Jodi Ito on the Information Security Program at the University of Hawaii
January 20, 2012

Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university's new information security…

Touch ID: Net Benefit or Net Loss?
October 8, 2013

Guest Blogger: Joshua Wright , @joswr1ght With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the …