Cybersecurity


Articles


Podcasts

  • A Security Operations Center Powered by Students

    The University of South Carolina Aiken recently found a creative way to staff a new security operations center — and give students hands-on cybersecurity training at the same time. We spoke with Ernest Pringle, vice chancellor for IT and CIO at USC Aiken, about creating a student-led SOC, helping students put cybersecurity theory into practice, forging regional cybersecurity partnerships, and more.

  • Balancing Data Insight with Data Governance, Privacy, and Transparency

    As VP for information technology and CIO at the University of Michigan, Ravi Pendse is committed to fostering a robust data culture that democratizes the use of data to inform decision-making. At the center of that culture is transparency: making sure students, faculty, and staff know exactly what types of data are collected, and how that data is stored, accessed, managed, and shared. Here, we talk about creating a data-aware, privacy-aware ecosystem, data governance challenges, making data visible to students, and more.


Webcasts

  • Getting Identity Right: Why Flexibility Is Key to a Modern IAM Solution

    In this fireside chat, Campus Technology Editor in Chief Rhea Kelly will speak with Unicon's Paul Spaude, IAM Software Engineer & Consultant, and David Mendez, Managing Director, Critical Infrastructure, about key considerations for implementing a modern identity solution, differences between open source and proprietary products, and what it takes to move a modernized identity solution forward on campus.

  • Navigating Modern Data Protection and Privacy in Education

    Watch today to gain valuable insights and actionable strategies to protect your organization's sensitive information!


Whitepapers

  • Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

    Cisco resolves billions of DNS requests every day and with every connection to website or application, we gain insight into threats being staged all over the internet. Download today to learn more!

  • Access Management Buyer's Guide

    The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. Download this buyer’s guide for answers and learn what to look for when choosing the best access management solution in today’s ever-changing world.

  • Phishing for Dummies

    Protecting yourself and your business from phishing attacks can be a daunting task. Organizations who want users to stay safe online should download this must-read ebook today!