Educause Security Discussion: by date
280 messages
starting Jul 02 12 and
ending Sep 28 12
Date index |
Thread index |
Author index
Monday, 02 July
Free CompTIA CTP+ exam VUE voucher Di Fabio, Andrea
Re: Free CompTIA CTP+ exam VUE voucher Brewer, Alex
Students with Internet Usage Restriction Bob Henry
SANS Securing the Human and SkillPort Mike Fox
Re: SANS Securing the Human and SkillPort Delaney, Cherry L.
Re: SANS Securing the Human and SkillPort Drew Perry
Re: SANS Securing the Human and SkillPort Delaney, Cherry L.
Re: SANS Securing the Human and SkillPort Dan Han
Re: SANS Securing the Human and SkillPort Drew Perry
JumpForward NCAA Compliance and Recruiting Shawn Kohrman
National Cyber Security Awareness Month is Right Around the Corner! David C. Lyon
Tuesday, 03 July
NYU Job Postings: Network Security Analyst and Senior Network Security Analyst Brian J Smith-Sweeney
Self Service Password Reset Shawn Kohrman
Thursday, 05 July
Re: Self Service Password Reset Schumacher, Adam J.
Re: Self Service Password Reset Shawn Kohrman
Re: Self Service Password Reset Schumacher, Adam J.
student password requirements for third party sites David Pirolo
Re: Self Service Password Reset Gallese, Brady T.
Friday, 06 July
Re: Self Service Password Reset Witmer, Robert
Re: Self Service Password Reset Gary Flynn
Re: Self Service Password Reset Dexter Caldwell
Tuesday, 10 July
Re: student password requirements for third party sites Steven Alexander
Wednesday, 11 July
Job opportunity Di Fabio, Andrea
Job Opportunities Gade, Werner
Thursday, 12 July
REN-ISAC & SANS partnership for discounted awareness and technical training - window closing soon Doug Pearson
Software Engineer for Virginia Tech PKI Support Dunker, Mary
Monday, 16 July
Job posting: Loyola University Chicago - Security Administrator ITS Jim Pardonek
CISSP Endorsement request Tarun Trivedi
Re: CISSP Endorsement request Bradley, Stephen W. Mr.
Re: CISSP Endorsement request Schoenefeld, Keith P.
Cisco ASA to Checkpoint - Firewall rule migration Shane Markley
Re: Cisco ASA to Checkpoint - Firewall rule migration Afsin Taskiran
Tuesday, 17 July
SecureDoc Pebby Garner (Information Security)
Re: SecureDoc SCHALIP, MICHAEL
Re: CISSP Endorsement request Roger A Safian
Re: SecureDoc Pebby Garner (Information Security)
Re: CISSP Endorsement request Leon DuPree
Re: SecureDoc Leon DuPree
Re: CISSP Endorsement request Doug Kahn
Re: CISSP Endorsement request Schoenefeld, Keith P.
Re: CISSP Endorsement request Valdis Kletnieks
Re: CISSP Endorsement request Wayne S. Martin
Re: CISSP Endorsement request David Pirolo
Re: CISSP Endorsement request Sigmon, Aaron
Re: CISSP Endorsement request David Gillett
Re: CISSP Endorsement request Gregory N Pendergast
Re: CISSP Endorsement request Mark Rogowski
Wednesday, 18 July
Re: CISSP Endorsement request Tarun Trivedi
Re: CISSP Endorsement request Webb, Justin
PCI SSC - Special Interest Groups Davis, Thomas R
Re: PCI SSC - Special Interest Groups David R. Millar
Re: PCI SSC - Special Interest Groups David Pirolo
Re: PCI SSC - Special Interest Groups David Pirolo
Thursday, 19 July
Re: PCI SSC - Special Interest Groups Davis, Thomas R
Re: PCI SSC - Special Interest Groups David Pirolo
Combating directory harvests Tyler T. Schoenke
Re: Combating directory harvests Roger A Safian
Re: Combating directory harvests Harry Hoffman
Re: Combating directory harvests Joel Rosenblatt
Re: PCI SSC - Special Interest Groups David Pirolo
Re: PCI SSC - Special Interest Groups John Ladwig
Barracuda Spam and Virus Firewall Christopher Jones
Re: Barracuda Spam and Virus Firewall Patrick Cannady
Re: Barracuda Spam and Virus Firewall Walter Petruska
Re: Barracuda Spam and Virus Firewall Garza, Veronica M.
Friday, 20 July
Re: PCI SSC - Special Interest Groups Davis, Thomas R
Re: Barracuda Spam and Virus Firewall Chuck Thomas
Re: Barracuda Spam and Virus Firewall Solomon Asmelash
Re: Barracuda Spam and Virus Firewall Nathaniel Hall
Google Docs abuse Dan Han
Re: Google Docs abuse Jeffrey Schiller
Re: Google Docs abuse Bob Bayn
Re: Google Docs abuse Jeffrey Schiller
Re: Google Docs abuse Dan Han
Monday, 23 July
IT Systems Support Professional (Information Security Office) at Kennesaw State University Stephen C. Gay
Re: Google Docs abuse Tracy Mitrano
Tuesday, 24 July
Linux sensitive number search tools David Seidl
IPICS Summer School 2012, 03 - 14 September 2012, Vienna, Austria IPICS2012
Re: Google Docs abuse Jacob Steelsmith
Barracuda Anti-Spam and Virus Firewall Christopher Jones
New ECAR CDS Spotlight Research Bulletin: Information Systems Risk Assessment Valerie Vogel
Self Provisioned AD Domain Guest Accounts Jim Pardonek
Re: Linux sensitive number search tools Woodruff, Dan
Wednesday, 25 July
Data Classificiation Policy Slocum, Stacy
Sunshine Law Email Retention Campbell, Josh
was RE: [SECURITY] Google Docs abuse David Gillett
Thursday, 26 July
Re: Sunshine Law Email Retention Berman, Mark
Re: A substitute for Google Alerts / Circumventing Google restrictions on spam suppression James H. Moore
Re: Sunshine Law Email Retention Baumstein,Avi H
Saturday, 28 July
Re: Self Provisioned AD Domain Guest Accounts Schumacher, Adam J.
Monday, 30 July
echoSign implementation Stephen C. Gay
Identity and Access Management Position at UA Nathan Zierfuss
Tuesday, 31 July
Wireless WPA2 MSCHAPv2 Parker, Ben C
Re: Wireless WPA2 MSCHAPv2 Steve Bohrer
Re: Wireless WPA2 MSCHAPv2 Caroline Couture
Re: Wireless WPA2 MSCHAPv2 Caroline Couture
Re: Wireless WPA2 MSCHAPv2 Justin Azoff
Re: Wireless WPA2 MSCHAPv2 Steve Bohrer
Re: Wireless WPA2 MSCHAPv2 Justin Azoff
Open Source or Freeware File / Free Space Erasers Tonkin, Derek K
Re: Wireless WPA2 MSCHAPv2 Harry Hoffman
Re: Open Source or Freeware File / Free Space Erasers King, Ronald A.
Re: Open Source or Freeware File / Free Space Erasers Joel Rosenblatt
Re: Open Source or Freeware File / Free Space Erasers Shamblin, Quinn
Re: Wireless WPA2 MSCHAPv2 Rich Graves
Re: Wireless WPA2 MSCHAPv2 Shamblin, Quinn
Re: Open Source or Freeware File / Free Space Erasers Hauber, Wayne [ITSEC]
Wednesday, 01 August
Re: Open Source or Freeware File / Free Space Erasers Beth Young
Re: Open Source or Freeware File / Free Space Erasers Tonkin, Derek K
Splunk Implementations in Higher Ed Martin Manjak
Microsoft Security Advisory (2737111) Roger A Safian
Re: Open Source or Freeware File / Free Space Erasers Eric C. Lukens
Re: Open Source or Freeware File / Free Space Erasers Tonkin, Derek K
Thursday, 02 August
Re: Wireless WPA2 MSCHAPv2 Joseph N Kurtin
Compliance Training for Security Analysts Wright, A J (A. J.)
Re: Compliance Training for Security Analysts Basile, Daniel L.
Re: Compliance Training for Security Analysts Dan Sarazen
Re: Compliance Training for Security Analysts Wayne S. Martin
Re: Compliance Training for Security Analysts Brad Judy
Friday, 03 August
Invitation to participate in research project: Employee Perceptions of Security Policies Martin Manjak
IDS/Data Recorder Terrance Humphries
Monday, 06 August
Re: Splunk Implementations in Higher Ed Patrick Gorsuch
Questions/thoughts around outsourcing guest wireless Perry, Jeff
University Information Security Officer at University of Arizona Banks, Teresa E - (tbanks)
Tuesday, 07 August
Re: Questions/thoughts around outsourcing guest wireless SCHALIP, MICHAEL
Re: Questions/thoughts around outsourcing guest wireless Shamblin, Quinn
Re: Questions/thoughts around outsourcing guest wireless Perry, Jeff
Re: Questions/thoughts around outsourcing guest wireless Tim Doty
Wednesday, 08 August
Private vs Publicly-Accessible IP Addresses Carr, Michael G
Re: Private vs Publicly-Accessible IP Addresses Valdis Kletnieks
Ad for UA Information Security Officer Banks, Teresa E - (tbanks)
Re: Ad for UA Information Security Officer Banks, Teresa E - (tbanks)
Thursday, 09 August
Teaching Staff How to Use Exchange/Outlook Junk Folder to Identify/Disarm Malicious Email Martin Manjak
Become a Champion of National Cyber Security Awareness Month David C. Lyon
Cloud based file storage Matt Marmet
Friday, 10 August
Security 5 Year Strategic Plan Daniel Bennett
Saturday, 11 August
Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) Jeffrey Schiller
Monday, 13 August
Re: Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) randy marchany
Re: Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) Ken Connelly
Information Security Staffing Metrics Survey Carlos Lobato
Network Staffing Miller,James R
Re: Do you need two Guest Wireless Networks? (Re: [SECURITY] Questions/thoughts around outsourcing guest wireless) Jones, Dan
Re: Network Staffing Dr. Wole Akpose
Re: Information Security Staffing Metrics Survey McLaughlin, Bryan S.
Re: Information Security Staffing Metrics Survey Harry Hoffman
Tuesday, 14 August
Video Taping Patients Hudson, Edward
Job Posting: Information Security Analyst at The University of Texas at Austin Charlie Scott
Wednesday, 15 August
Job Posting - Director of Information Security @ The University of Scranton Scott Finlon
Re: Linux sensitive number search tools Randy Marchany
Social Engineering your way into someone else's iCloud Martin Manjak
Free Webcast: Conducting a Legal Investigation in Social Media (9/13, 1pm EDT) Valerie Vogel
Thursday, 16 August
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Maciej Kozuszek
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Valdis Kletnieks
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Ken Connelly
Re: Job Posting: Information Security Analyst at The University of Texas at Austin SCHALIP, MICHAEL
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Maciej Kozuszek
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Jacobson, Dick
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Pratt, Benjamin E.
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Tim Doty
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Brad Judy
Re: Job Posting: Information Security Analyst at The University of Texas at Austin Valerie Vogel
Job Postings (2): Arizona State University Evelyn Pidgeon
Tuesday, 21 August
Policy/Practices for Remote Control/Remote Access to Institutionally Owned Computers Jack Rutt
Wednesday, 22 August
Re: Policy/Practices for Remote Control/Remote Access to Institutionally Owned Computers Dennis Bohn
PHP vs ColdFusion Security Concerns Jim Pardonek
Friday, 24 August
Patching Windows VM on Parallels/Fusion Shandon Bates
Re: Patching Windows VM on Parallels/Fusion Dave Koontz
Monday, 27 August
Password keepers Slocum, Stacy
Re: Password keepers SCHALIP, MICHAEL
Re: Password keepers Shamblin, Quinn
Re: Password keepers Woodruff, Dan
Re: Password keepers Joel Rosenblatt
Re: Password keepers Cappalli, Tim G @ LSC-OIT
Re: Password keepers David Curry
Re: Password keepers Shawn Kohrman
Re: Password keepers Clifford Collins
Re: Password keepers Dave Koontz
Re: Password keepers Daniel Bennett
Re: Password keepers Josh Drummond
Tuesday, 28 August
Java 7 Security Manager Bypass Vulnerability Bateman, Darrell
Re: Java 7 Security Manager Bypass Vulnerability - drop back to 1.6.34 if possible. Chuck Braden
Re: Java 7 Security Manager Bypass Vulnerability Shamblin, Quinn
Thursday, 30 August
Cyber-Bullying Daniel Bennett
Re: Cyber-Bullying Roger A Safian
Re: Cyber-Bullying Dan Sarazen
Re: Cyber-Bullying Daniel Bennett
Re: Cyber-Bullying Shamblin, Quinn
Re: Cyber-Bullying Mike Porter
Re: Cyber-Bullying Gioia, Matthew P.
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Chuck Braden
Rethinking the DMZ Youngquist, Jason R.
Re: Rethinking the DMZ Jeff Moore
Re: Rethinking the DMZ Joel Rosenblatt
Re: Rethinking the DMZ Harry Hoffman
Friday, 31 August
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Hanson, Mike
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Shamblin, Quinn
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released John Ladwig
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Schoenefeld, Keith P.
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Hanson, Mike
Re: Java 7 Security Manager Bypass Vulnerability - Java 1.7.07 just released Gary Flynn
Re: - Java 1.7.07 just released - vulnerability identified Chuck Braden
Re: Rethinking the DMZ John Hoffoss
Granting all users (or "a select few"??) administrative rights on their own computer systems?? SCHALIP, MICHAEL
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Jeff Moore
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Cappalli, Tim G @ LSC-OIT
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Shalla, Kevin
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Kriss, George N
Saturday, 01 September
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Schumacher, Adam J.
Tuesday, 04 September
Re: Rethinking the DMZ Julian Y Koh
Re: Rethinking the DMZ Deke Kassabian
Wednesday, 05 September
Re: Granting all users (or "a select few"??) administrative rights on their own computer systems?? Chris Green
Thursday, 06 September
Re: Granting all users (or "a select few"??) administrative= rights on their own computer systems?? Durfee, Jeff
2012 VA SCAN Conference Neel, Jonathon L.
Job Posting: ISD at Teachers College, Columbia University Haines, Ena
Re: Rethinking the DMZ Haines, Ena
Re: Rethinking the DMZ John Ladwig
Re: Rethinking the DMZ Mike Caudill
Re: Rethinking the DMZ David Byers
Re: Rethinking the DMZ Jeff Kell
Re: Rethinking the DMZ Mike Caudill
Re: Rethinking the DMZ Joe St Sauver
Re: Rethinking the DMZ Justin Azoff
Re: Rethinking the DMZ Harry Hoffman
Re: Rethinking the DMZ Gary Flynn
Re: Rethinking the DMZ Harry Hoffman
Friday, 07 September
FISMA Compliance Jay Graham
HEISC Speakers Bureau Brym, Petr
Sunday, 09 September
Re: FISMA Compliance Shamblin, Quinn
Monday, 10 September
VPN deployment breadth (Quick Poll) Calo, Andrew
Re: VPN deployment breadth (Quick Poll) Doug Kahn
Re: Rethinking the DMZ Brian Helman
Tuesday, 11 September
FYI: Handheld and Mobile Computing CG is now Mobile Technologies Valerie Vogel
Wednesday, 12 September
Any special preparations in anticipation of KB2661254 (Key Length) patch? Martin Manjak
Password security training - USU's latest efforts Valerie Vogel
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Hanson, Mike
EDUCAUSE Review Article on National Cyber Security Awareness Month David C. Lyon
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Gary Flynn
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? David Lundy
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Louis APONTE
Re: Any special preparations in anticipation of KB2661254 (Key Length) patch? Campbell, Josh
Thursday, 13 September
Registration is OPEN for SANS LEG 523 Law of Data Security and Investigations Beth Young
Rutgers Hosting SANS Law of Data Security and Investigations Course Tom Siu, CISO, Case Western Reserve University
Sunday, 16 September
Cloud Computing Security Survey Taka Kajiyama
Wednesday, 19 September
Botnet Detection Systems WILLIAM I ARNOLD
Re: Botnet Detection Systems Schattle, Donald
Re: Botnet Detection Systems Sigmon, Aaron
Re: Botnet Detection Systems Calo, Andrew
Re: Botnet Detection Systems PATRICK, MARTIN
Palo Alto Networks Webinar: Academic Freedom or Application Chaos: A Delicate Balancing Act Marty Golizio
2013 Information Security Awareness Student Video & Poster Contest David C. Lyon
Thursday, 20 September
Re: Botnet Detection Systems Dennis Bohn
Multi-platform two-factor terminal services? Mike Osterman
spamhaus drop etc. john
Re: spamhaus drop etc. Justin Azoff
Re: spamhaus drop etc. Jeff Kell
Re: spamhaus drop etc. King, Ronald A.
Enterprise DLP Solutions Barnes, Sylvia A
Re: Botnet Detection Systems Afsin Taskiran
Friday, 21 September
Re: Multi-platform two-factor terminal services? Cathy Hubbs
Re: Multi-platform two-factor terminal services? John Kaftan
Monday, 24 September
Pitney Bowes Mail & Go Postal Kiosk Elizabeth Shannon
Tuesday, 25 September
University of Missouri - St. Louis System Security Analyst - specialist job opening Mark Monroe
IT Frameworks - Quick Survey Carlos Lobato
Re: IT Frameworks - Quick Survey Carson, Larry
Compromised version of phpMyAdmin contains backdoor Chuck Braden
Re: Compromised version of phpMyAdmin contains backdoor Valdis Kletnieks
Re: Compromised version of phpMyAdmin contains backdoor Basile, Daniel L.
Wednesday, 26 September
Job, Network Monitoring/Penetration Testing - Info Sec Engineer @ Carnegie Mellon Ted Pham
Re: Enterprise DLP Solutions Philip Webster
Thursday, 27 September
Re: Compromised version of phpMyAdmin contains backdoor Chuck Braden
Re: Compromised version of phpMyAdmin contains backdoor Chuck Braden
3rd party Webform 'Services' Kimberly Heimbrock
Has Anybody upgraded McAfee Endpoint Encryption? David Grisham
Cybersecurity Awareness Resource Library: Materials for NCSAM 2012 David C. Lyon
LAST CHANCE: Please register by October 1: Registration is OPEN for SANS LEG 523 Law of Data Security and Investigations (fwd) Beth E. Binde
Friday, 28 September
Re: Security 5 Year Strategic Plan Joshua Beeman
Constant Contact--Possible Issues Geoffrey Steven Nathan
Re: Constant Contact--Possible Issues Dexter Caldwell
Email Gateway Self, Dennis
Next IAM Online: Implementing an Effective IAM Program, Oct. 10, 2012 Valerie Vogel