Main Nav

Search results

Showing 81 - 90 of 236 Results

Sort by:

Defend IT: Security by Example - Book Review
January 1, 2005

Recommended Reading Defend IT: Security by Example Ajay Gupta and Scott Laliberte Addison Wesley Professional, 2004 $34.99 (paper), 384 pp. ISBN 0-321-19767-4  …

Incident Response at UT Austin
January 1, 2006

An interview with VP for IT Dan Updegrove. The recent break-in to an administrative database at the McCombs School of Business at UT Austin (TX), discovered April 21, 2006, may have compromised the…

Locking Down Departmental Data
January 1, 2006

As hackers have found their way into computer networks around the country in recent years — putting individuals' personal information at risk of identity theft and embarrassing companies, co…

Current IT Issues Survey Report, 2006
January 1, 2006

Current Issues Current IT Issues Survey Report, 2006 Security and Identity Management edges out Funding IT as the top strategic challenge, while Disaster Recovery/Business Continuity reemer…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Open-source bugs undermine digital signatures
January 1, 2006

A pair of security bugs in cryptography software could allow an attacker to insert content into a digitally signed message or forge signatures on files. …

Surveying the Steps to a Secure Emory University
March 28, 2006

This research bulletin summarizes how Emory University used the results of a security survey of higher education institutions to make important, peer-informed decisions on how to secure and prote…

Server hack at Georgetown University probed
January 1, 2006

Data on as many as 41,000 people may have been compromised. Data on as many as 41,000 people may have been compromised. …

Create A Comprehensive Information Security Program with Limited Resources
November 7, 2012 | A session at the EDUCAUSE Annual Conference 2012

Smaller colleges and universities may not have the luxury of dedicated IT security personnel, yet we have all of the same requirements for managing risks, safeguarding and protecting systems and …

Data Privacy: What We Can Learn From the Suits
January 1, 2006

Savvy college and university administrators are engaging government and business experts to ensure data security and privacy on campus. Maybe they're on to something. …

Close
Close


EDUCAUSE Connect
View dates and locations

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.