Cybersecurity could be the answer for many in the Great Resignation, but finding a way into the industry can prove challenging. The U.S. labor force is undergoing a drastic change.…
Why Hackers Love Universities
Joel Rosenblatt | Director of Computer and Network Security, Columbia UniversityI have headed up the network and computer security team at Columbia University for the last 20 years, and I can safely say that if you are at an institute…
Cybersecurity is a top of mind issue for all CIOs, and higher education is no exception. As in other sectors, cyber-attacks in higher education are directly and indirectly related to…
Beyond Security: Overcoming Additional Risks Associated with Institutional Data Analytics
James Wiley | Eduventures Principal Analyst, National Research Center for College & University AdmissionsThe advantages of leveraging Big Data in the higher education context are becoming increasingly clear to college and university leaders. From helping to drive student persistence and success to informing…
The Impact of Big Data on Student Privacy and How Universities Must React
Joel Rosenblatt | Director of Computer and Network Security, Columbia UniversityBig Data and Big Risks: Protecting Higher Education from Cyberattack
Teju Herath | Associate Professor of Information Systems in the Goodman School of Business, Brock UniversityProtecting Student Data: A Cybersecurity Challenge
Jane LeClair | Chief Operating Officer, Washington Center for Cybersecurity Research & DevelopmentCloud Shift Requires Vendor Leadership and New Procurement Processes
Tracy Mitrano | Director of Internet Culture Policy and Law, Cornell UniversityNavigating Risk Management Challenges in Today’s Highly Complex Environment
Tim Wiseman | Assistant Vice Chancellor for Enterprise Risk Management, East Carolina UniversityCreating a Cohesive Student Experience While Keeping Security in Check
Quinn Shamblin | Executive Director of Information Services, Boston UniversityBuilding Your Team: The Ins and Outs of Higher Ed IT Security
Joel Rosenblatt | Director of Computer and Network Security, Columbia UniversityCyber-Risk: Balancing Access, Security and Privacy (Part 2)
Ken Udas | Vice Provost, Digital Learning Initiatives, University of IdahoCyber-Risk: Privacy, Access and Student-Customer Expectations (Part 1)
Ken Udas | Vice Provost, Digital Learning Initiatives, University of Idaho Scott SorleyThe following interview is with Jeremy Epstein, a senior computer scientist with SRI International. Epstein has spent his career working on improving cyber security across a wide range of industries…
Prevention Better Than Cure: Security Breaches Cost Higher Ed
Novadean Watson-Stone | Program Director for Information Technology, American Public University SystemThe following email Q&A is with Novadean Watson-Stone, IT program director at the American Public University System. A recent report by BitSight Technologies said higher education institutions are worse-equipped to…
The following email Q&A is with Clay Wilson, cybersecurity program director at the American Public University System. Student information security has risen to become one of the leading areas of…
Cybersecurity: Assessment and Authorization
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeFederal agencies are required by law to undergo a detailed and systematic security assessment process to demonstrate compliance with security standards. This process is known as the assessment and authorization—or…
What It Takes to Keep Student Information Safe in the Digital Age
Gary Langsdale | University Risk Officer, Pennsylvania State UniversityCybersecurity: Audit and Accountability
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeIdentification, Validation and Authentication: All Different But Not All Compliant
Charles Dull | Associate Dean of the IT Center of Excellence, Cuyahoga Community CollegeCybersecurity: Awareness Training and the 90/10 Rule
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeCybersecurity: Access Control
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeTechnology Partners, Big Data and the Future of Privacy
Barmak Nassirian | Director of Federal Relations and Policy Analysis, AASCUCybersecurity: Understanding the Online Threat
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University CollegeFuture Trends in Data Security for Online Distance Education
Rick Shearer | Director of World Campus Learning Design, The Pennsylvania State UniversityAnonymity Makes IT Security a Must for Higher Education Institutions
Joel Rosenblatt | Director of Computer and Network Security, Columbia UniversityWith the rapid shift to online learning in the past few years, and the move to cloud-based computing and cloud-based applications, there is a need to revisit the protection of…