When Salesforce introduced its upcoming Blockchain platform, Arizona State University shared the stage too, as an early adopter and partner in an effort to apply blockchain technology to student academic records. ASU's EdPlus CTO Donna Kidwell shares basics of the plan.
People in education are more likely to click on phishing e-mails than any other major segment, according to the latest Verizon data breach report.
A digital attack recently hit 201 online campus stores, all running the same checkout software. A cybercrime group injected a version of Magecart, first reported by Trend Micro, into campus store websites to scrape credit card and other customer data during checkout, which was then sent to a remote server.
A new report finds attackers are drawn to the education sector owing to the wealth of personally identifiable information on students, faculty and organizations associated with universities and schools.
Georgia Tech recently went public about a data breach — the second in less than a year — that could have exposed the personal information of up to 1.3 million people.
Computer-based testing center company Pearson VUE will be embedding new identity verification into its remote testing service.
Getting IAM right can take some serious planning and analysis plus a commitment to continued evolution over the long term. Here, three universities share their experiences.
The use of data analytics and artificial intelligence, the inevitability of data breaches and six other topical subjects made up the latest "State of Higher Education" report from consultancy firm Grant Thornton.
Stanford University has implemented a "bug bounty" program that pays people for finding vulnerabilities in the university's software systems. Set up by the Information Security office, the program is only open to Stanford students and full-time employees. Rewards range from $50 to $1,000, all paid in Amazon gift cards.
Malicious cryptomining or cryptojacking, as it's called, describes the theft of computer processing resources — electricity, cloud services and other digital assets — that are then exploited to do cryptocurrency mining without the owner's permission or knowledge.