CT Industry

:: NEWS

THE BROWSER MENACE. Security research and education organization The SANS Institute has revealed its list of the top 10 cyber security menaces for 2008. Topping the list: increasingly sophisticated website attacks that exploit browser vulnerability, especially on trusted websites; increasing sophistication and effectiveness in botnets; and cyber espionage efforts by wellresourced organizations looking to extract large amounts of data, particularly using targeted phishing. Read more here.

GOING GREEN. Control and automation systems vendor Crestron Electronics has joined the US Green Building Council. "Our goal is to share our expertise and experience in controlling and managing systems to maximize energy conservation and cost savings," says Randy Klein, executive VP of Crestron.

PARTNERING FOR COURSE CONTENT. Cdigix, a provider of rich digital media services for colleges and universities, has partnered with class capture vendor Tegrity to increase availability of on-demand course materials. The collaboration will allow a school to provide seamless access to recorded classes and lectures, in addition to other richmedia assets owned and licensed by the institution, all integrated into the teaching and learning environment.

CT Industry

SWEET BRIAR COLLEGE is using Google optimization technology to target specific regions of the US and find the right student candidates.

TARGETED RECRUITMENT. To locate potential students, Sweet Briar College, the small women's college in central Virginia, is now using geography-based Google optimization technology developed by marketing solutions provider Digital Motion. The technology enables Sweet Briar to target young women who fit the school's student profile in regions of the US where it previously has drawn applicants. Prospective candidates in the targeted marketing areas then see a link sponsored by Sweet Briar when they search responsive keywords (the words were researched by Digital Motion through student profiling and lifestyle analytics).

:: M & A, Etc.

WIRELESS ACQUISITION. Usercentric network and secure mobility solutions provider Aruba Networks has purchased AirWave Wireless, a developer of wireless network management software. AirWave will operate as a business unit of Aruba.

SUN TO NAB MYSQL. Sun Microsystems has announced a definitive agreement to acquire MySQL. According to company spokespeople, Sun hopes the pairing will drive new adoption of MySQL's open source database in more traditional applications and enterprises. Read more here.

COMBINING FOR BI. SAP has acquired business intelligence vendor Business Objects. As part of the companies' integration, they have announced an initial slate of joint product offerings, including tools for financial performance management; governance, risk, and compliance; and visualization and reporting.

BB MOVES INTO ALERT AND NOTIFICATION MARKET. Blackboard has announced it will acquire The NTI Group, a provider of mass messaging and notification solutions for education and government organizations. Read more here.

NEW NAME, SAME GAME. Virtual business simulation program provider Management Simulations has changed its name to Capsim Management Simulations. The new name brings the company's identity in line with its existing web address, www.capsim.com.

:: PEOPLE

Daniel ConradNEW EMBANET CIO. Online education provider Embanet has appointed Daniel Conrad to the newly created position of CIO. Conrad will assume responsibility for the continuing development of Embanet's IT infrastructure, including course development and technical support.

Featured

  • network of transparent cloud icons, each containing a security symbol like a lock or shield

    Okta, OpenID Foundation Propose New Identity Security Standard

    Okta and the OpenID Foundation have announced the formation of the IPSIE Working Group — with the acronym standing for Interoperability Profiling for Secure Identity in the Enterprise — dedicated to a new identity security standard for Software-as-a-Service (SaaS) applications.

  • UIUC Study: AI Agents Can Exploit Cybersecurity Vulnerabilities

    In a new study from the University of Illinois Urbana-Champaign (UIUC), researchers demonstrated that large language model agents can autonomously exploit real-world cybersecurity vulnerabilities, raising critical concerns about the widespread deployment and security of these advanced AI systems.

  • IBM and Microsoft Partner on Cloud Security

    IBM and Microsoft have announced a "strengthened cybersecurity collaboration" aims at fortifying their joint customers' cloud environments.

  • scene in a cybersecurity operations center, showing an AI and a human competing head-to-head

    91% of CISOs Say AI Will Outperform Security Pros

    A new survey of CISOs by Bugcrowd indicates AI is already beating security pros in some areas and is expected to take on a larger role in the future.