Main Nav

Search results

Showing 21 - 30 of 87 Results

Sort by:

7 Ways BYOD Could Get You Sued
July 18, 2012

The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012

Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

Rolling Out a BYOD (Bring Your Own Device) Program
June 5, 2012

Use of personally owned devices continues to grow on campuses. If we don’t support these devices , community members will find their own way to support them, which could put our networks…

Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT
July 11, 2012

Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in e…

Multiple Devices and Platforms: Institutional Strategies
May 17, 2012

This CNI’s Executive Roundtable on multiple devices and platforms discussed institutional strategies concerning BYOD. Faculty, staff, and students in our institutions continue to use laptops a…

8 Mobile Device Security Steps
October 1, 2013 | A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps

Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …

Touch ID: Net Benefit or Net Loss?
October 8, 2013

Guest Blogger: Joshua Wright , @joswr1ght With the introduction of the iPhone 5S, Apple debuted Touch ID, an integrated fingerprint authentication system used for unlocking the …

Graduating to Mobility through E-Learning
October 17, 2013 | A session at the EDUCAUSE Annual Conference 2013

With the exponential growth of mobile devices and tablets entering the classroom across educational institutions, learning is evolving. This session will provide attendees with strategies on how in…

Podcast: Jodi Ito on the Information Security Program at the University of Hawaii
January 20, 2012

Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university's new information security…