Cybersecurity


Articles


Podcasts

  • A Security Operations Center Powered by Students

    The University of South Carolina Aiken recently found a creative way to staff a new security operations center — and give students hands-on cybersecurity training at the same time. We spoke with Ernest Pringle, vice chancellor for IT and CIO at USC Aiken, about creating a student-led SOC, helping students put cybersecurity theory into practice, forging regional cybersecurity partnerships, and more.

  • Balancing Data Insight with Data Governance, Privacy, and Transparency

    As VP for information technology and CIO at the University of Michigan, Ravi Pendse is committed to fostering a robust data culture that democratizes the use of data to inform decision-making. At the center of that culture is transparency: making sure students, faculty, and staff know exactly what types of data are collected, and how that data is stored, accessed, managed, and shared. Here, we talk about creating a data-aware, privacy-aware ecosystem, data governance challenges, making data visible to students, and more.


Webcasts

  • Getting Identity Right: Why Flexibility Is Key to a Modern IAM Solution

    In this fireside chat, Campus Technology Editor in Chief Rhea Kelly will speak with Unicon's Paul Spaude, IAM Software Engineer & Consultant, and David Mendez, Managing Director, Critical Infrastructure, about key considerations for implementing a modern identity solution, differences between open source and proprietary products, and what it takes to move a modernized identity solution forward on campus.

  • Navigating Modern Data Protection and Privacy in Education

    Watch today to gain valuable insights and actionable strategies to protect your organization's sensitive information!


Whitepapers

  • Keeping the Faith in the Cloud

    Download to discover efficient and affordable solutions available for cloud-based backup and recovery essentials, as well as surveillance, multimedia storage and nascent AI/ML applications or training models!

  • From Complexity to Clarity: Securing Cloud Environments in Higher Education

    The proliferation of AI and cloud-native tools alongside ‘shadow’ cloud deployments bring the importance of unified visibility and context clearly into focus. Download this checklist today to learn more!

  • 7 Key Considerations for Modernizing Identity Management in Higher Education

    Inter-institutional collaboration, cloud computing, online/distance education, teleworking and portable computing, federation, access from anywhere at any time, and many other business needs are challenging institutions of higher education to adapt or rebuild their Identity and Access Management (IAM) infrastructures.