Should colleges and universities be insisting on the use of encryption for the transmission of sensitive information among its student applicants? That's what one security firm is recommending after doing an informal audit of 162 American institutions, including schools that are part of the Big 10, the Big 8, the Ivy League, community colleges, and technical institutes.
Academia has taken considerable heat over some high-profile data breaches in the last decade. However, a new visualization tool puts those breaches into perspective. Against the background noise of data breaches in government and the private sector, breaches in academic institutions are for the most part invisible.
Stanford University is working with law enforcement and security consultants to investigate a data breach in its IT infrastructure that appears to have divulged user names and possibly other information.
With students and faculty now accessing applications in the cloud, IT departments should consider the merits of federating, centralizing--and even outsourcing--identity management. The rewards? Greater security, convenience, and lower costs.
Cooper Notification is adding the ability to connect to the Federal Emergency Management Agency's Wireless Emergency Alert system and Emergency Alert System through the company's mass notification system, the Roam Secure Alert Network.
A small college in Vermont has gone public with an incident that could lead to data breaches afflicting more than 14,200 people.
Moving your data storage, backup, and disaster recovery to the cloud can cut costs and improve functionality for both end users and tech personnel.
Eighty-five percent of educational institutions allow instructors or students to use their own devices on institutional networks according to a new survey from Bradford Networks.
The University of Southern California is the newest member of the Northrop Grumman Cybersecurity Research Consortium, a partnership between academia and industry working together to increase Northrop Grumman Corporation's technological capabilities in the area of cybersecurity.
A security technology company has implemented a new theft management service that may interest schools running iPad programs.