Identification, Validation and Authentication: All Different But Not All Compliant
Measures to prevent financial aid fraud should not be confused with those designed to maximize...
Charles Dull | Associate Dean of the IT Center of Excellence, Cuyahoga Community College
Measures to prevent financial aid fraud should not be confused with those designed to maximize...
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University College
Regular cybersecurity awareness training is a critical piece of an institution’s defense against...
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University College
Access control mechanisms ensure that no unauthorized parties can get into an institution’s system....
Barmak Nassirian | Director of Federal Relations and Policy Analysis, AASCU
While partnerships on technology matters are critical for operational efficiency, institutions must...
Sam Musa | Cyber Security Adjunct Professor, University of Maryland University College
Cybercrime can pose a threat to higher education institutions and their students, but there are a...
Rick Shearer | Director of World Campus Learning Design, The Pennsylvania State University
While advances in technology certainly make way for a number of exciting opportunities, it is also...
Joel Rosenblatt | Director of Computer and Network Security, Columbia University
Identity verification is a major hurdle institutions must overcome as online learning and e-crimes...
Rick Shearer | Director of World Campus Learning Design, The Pennsylvania State University
With the rapid shift to online learning in the past few years, and the move to cloud-based...