Main Nav

Search results

Showing 21 - 30 of 87 Results

Sort by:

For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012

Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

Who Moved My Office? The Evolving Role of the CISO
June 19, 2014 | A session at the EDUCAUSE LIVE! - Who Moved My Office? The Evolving Role of the CISO

In a fast-paced world of innovation, mobility, outsourcing, and social technology, today's chief information security officers must possess a blend of warrior-like technical skills combined …

Rolling Out a BYOD (Bring Your Own Device) Program
June 5, 2012

Use of personally owned devices continues to grow on campuses. If we don’t support these devices , community members will find their own way to support them, which could put our networks…

Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT
July 11, 2012

Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in e…

Multiple Devices and Platforms: Institutional Strategies
May 17, 2012

This CNI’s Executive Roundtable on multiple devices and platforms discussed institutional strategies concerning BYOD. Faculty, staff, and students in our institutions continue to use laptops a…

Sensitive Information Is Pouring through the Floodgates
May 7, 2014 | A session at the Security Professionals Conference

How many people come to work each day carrying smartphones and tablets not realizing that they have opened the floodgates, leaking sensitive information around the world without even knowing it? …

HTML5 Security
May 7, 2014 | A session at the Security Professionals Conference

HTML5 is an emerging technology with broad implications for mobile application development and delivery. A number of new security-related features are contained in the HTML5 specification that ca…

Podcast: Jodi Ito on the Information Security Program at the University of Hawaii
January 20, 2012

Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university's new information security…

Data Privacy Legislation: An Analysis of the Current Legislative Landscape and the Implications for Higher Education (8/12/11)
August 12, 2011

With the ubiquity of mobile devices and the increases in data breaches, Congress has responded with bipartisan support for comprehensive privacy legislation. As of August 2011, 18 bills have bee…

Mobile Internet Device Security Guidelines
June 29, 2011

This document is designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. It is organized into steps you can follow to define your objectives …