Main Nav

Search results

Showing 51 - 60 of 3049 Results

Sort by:

User Authentication Technologies Beyond the Password
July 20, 2015

User authentication is an essential element of modern IT systems, yet understanding options and balancing requirements remain complex. One-time passwords, smart cards, certificates, biometrics an…

Research Computing in the Cloud: Functional Considerations for Research
July 14, 2015

Transitioning to use of cloud services is becoming commonplace in higher education, but this trend has not been fully tested for research computing . Research computing involves unique needs a…

Password Managers
July 14, 2015

Learn more about password manager tools, who might use these tools and why, as well as the benefits and risks to consider when using these tools. This resource also includes a list of technologie…

CDS Spotlight: Information Security
June 26, 2015

This research bulletin uses data from Modules 1 and 7 of the EDUCAUSE Core Data Service to examine the current state of information security in higher education. Using an infographic format, …

Where Should You Keep Your Data?
June 25, 2015

"Formal policies on information storage are finally beginning to emerge from federal grant agencies. Federal funding agencies have made it clear that grant proposals must include plans for s…

Third-Party Security Awareness Training Tools
June 17, 2015

Learn more about third-party security awareness training tools, who might use these tools and why, as well as the benefits and risks to consider when using these tools. This resource also include…

EDUCAUSE Comments: NTIA Multi-Stakeholder Process for Cybersecurity Engagement
May 20, 2015

The National Telecommunications and Information Administration (NTIA) released a request-for-comments (RFC) in Spring 2015 on behalf of the U.S. Department of Commerce’s multi-agency Internet P…

EDUCAUSE Comments: NIST Controlled Unclassified Information Guidelines
May 19, 2015

In late 2014, the National Institute of Standards and Technology (NIST) released an initial public draft of a new set of guidelines for federal agencies to follow in securing sensitive unclassifi…

Preparing the IT Organization for the Cloud
May 7, 2015

Cloud-based IT services are becoming a norm for higher education, providing researchers, faculty, students, and administrators alike with the tools that they need in order to do their work. But t…

2015 Strategic Information Security Issues Infographic
April 24, 2015

Featuring data from the EDUCAUSE Center for Analysis and Research and the EDUCAUSE Core Data Service, this infographic highlights the 2015 Top Information Security Strategic Issues selected by th…