Educause Security Discussion: by author

262 messages starting Nov 13 13 and ending Oct 09 13
Date index | Thread index | Author index


Albert Lunde

Re: Small cheap custom phishing Albert Lunde (Nov 13)

Alexander W. Miranda

Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Alexander W. Miranda (Dec 12)

Alex Jalso

end point and credit protection Alex Jalso (Oct 22)

Allan Nelson

Checkpoint Vs. Palo Alto Vs. Fortinet Allan Nelson (Nov 01)

Andrew Daviel

FYI - Adobe account compromise Andrew Daviel (Nov 06)

Ashfield, Matt (NBCC)

making intranet content available to outside sources Ashfield, Matt (NBCC) (Oct 18)

Babayemi Omole

Cloud Computing Survey Babayemi Omole (Oct 24)
Cloud Computing Survey Babayemi Omole (Oct 25)

Barron Hulver

Re: inital passwords for students Barron Hulver (Dec 06)

Ben Marsden

SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden (Dec 06)
Re: Google Apps alerts protocol Ben Marsden (Oct 10)
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden (Dec 06)

Beth Young

REN-ISAC/SANS Aggregate purchase program webcast Beth Young (Nov 15)
REN-ISAC and SANS NCSAM Webcast October 28 Beth Young (Oct 18)

Bob Bayn

Re: Blocking phishing URL's Bob Bayn (Dec 02)

Bohlk, Christopher J.

Effective and Competitively Priced SIEMs Bohlk, Christopher J. (Oct 04)
FISMA Bohlk, Christopher J. (Nov 04)

Bradley, Stephen

Re: Checkpoint Vs. Palo Alto Vs. Fortinet Bradley, Stephen (Nov 04)

Brian Helman

Re: FYI - Adobe account compromise Brian Helman (Nov 07)
Annual Conference Community and Constituent Group Lounge Brian Helman (Oct 11)
Re: FYI - Adobe account compromise Brian Helman (Nov 10)
uptick in http scanning? Brian Helman (Dec 20)
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Brian Helman (Nov 07)
Re: FYI - Adobe account compromise Brian Helman (Nov 11)
Re: Chromecast devices? Brian Helman (Oct 09)
Re: Chromecast devices? Brian Helman (Oct 03)

Carlos Lobato

Data Governance Program Resources Carlos Lobato (Oct 08)
Re: Federal laws applicable to Universities Carlos Lobato (Nov 07)

Carr, Michael G

Network AuthN @ Public Research Universities? Carr, Michael G (Oct 16)
Re: Federal laws applicable to Universities Carr, Michael G (Nov 07)
Job Posting - Univ of KY (UK) Network Security Analyst Carr, Michael G (Nov 26)

Charles Buchholtz

Re: Do you use video conferencing for identity proofing remote students? Charles Buchholtz (Nov 13)

Chris Green

Re: a question about having College ID number as part of directory information Chris Green (Nov 07)
Re: Encryption Chris Green (Nov 20)
Re: Encryption Chris Green (Nov 20)
Re: Cisco FWSM and Random Sequencing Chris Green (Oct 21)

Chris Vakhordjian

Re: reporting structure Chris Vakhordjian (Oct 23)

Clouse, Michael J

Re: SQRL (Re: [SECURITY] Image, word, and password login) Clouse, Michael J (Dec 09)

Dan Han

Re: Encryption Dan Han (Nov 21)
Re: Federal laws applicable to Universities Dan Han (Nov 07)
File sharing settings with cloud collaboration tools Dan Han (Nov 05)
Job posting - VCU Senior Info Sec Analyst Dan Han (Nov 22)

Dan Peterson

Re: Do you use video conferencing for identity proofing remote students? Dan Peterson (Nov 13)
help Dan Peterson (Dec 03)
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson (Nov 13)

Dan Schwartz

Re: inital passwords for students Dan Schwartz (Dec 06)

Dave Koontz

Re: capturing full URL information via DNS request logs Dave Koontz (Oct 09)

David Curry

Remote access to SIS/ERP? David Curry (Dec 09)
Re: inital passwords for students David Curry (Dec 06)
Re: inital passwords for students David Curry (Dec 06)
Re: inital passwords for students David Curry (Dec 06)

David Escalante

Re: TOR and the Digital Freedom Conversation David Escalante (Dec 11)

Derek Diget

Image, word, and password login Derek Diget (Dec 06)

Dexter Caldwell

Re: WildCard Certificates Dexter Caldwell (Nov 22)
Re: Chromecast devices? Dexter Caldwell (Oct 09)
Re: Chromecast devices? Dexter Caldwell (Oct 09)
Re: WildCard Certificates Dexter Caldwell (Nov 22)

Di Fabio, Andrea

OSHA Required Hazard Communication Di Fabio, Andrea (Oct 16)

Don Faulkner

Re: inital passwords for students Don Faulkner (Dec 10)

Doug Pearson

REN-ISAC ALERT: Threat to institutional computer accounts by the Adobe breach Doug Pearson (Nov 12)
job posting: REN-ISAC Principal Security Engineer Doug Pearson (Nov 12)

Drews, Jane E

Job Posting: IT Security Architect - University of Iowa Drews, Jane E (Nov 01)

Emery Rudolph

Re: Chromecast devices? Emery Rudolph (Oct 02)

Emily Harris

Re: Google Apps alerts protocol Emily Harris (Oct 10)
Google Apps alerts protocol Emily Harris (Oct 07)

Eric Schewe

Re: Blocking phishing URL's Eric Schewe (Dec 02)

Eric Weakland

Digication and google OpenID Eric Weakland (Nov 22)

Feehan, Patrick

Re: Federal laws applicable to Universities Feehan, Patrick (Nov 07)

Flynn, Gary - flynngn

Re: Do you use video conferencing for identity proofing remote students? Flynn, Gary - flynngn (Nov 13)

Francisco Pérez

Re: Federal laws applicable to Universities Francisco Pérez (Nov 07)
Federal laws applicable to Universities Francisco Pérez (Nov 07)

Gary Warner

Re: FYI - Adobe account compromise Gary Warner (Nov 12)
Re: FYI - Adobe account compromise Gary Warner (Nov 11)

Gene Spafford

Seen this? Gene Spafford (Nov 19)

George Farah

Re: reporting structure George Farah (Oct 23)

Gramke, Jim

WildCard Certificates Gramke, Jim (Nov 22)
URL Logging Allowed? Gramke, Jim (Nov 11)
Re: WildCard Certificates Gramke, Jim (Nov 22)

Hanson, Mike

Re: Remote access to SIS/ERP? Hanson, Mike (Dec 16)

Harry Hoffman

Re: capturing full URL information via DNS request logs Harry Hoffman (Oct 09)
Re: capturing full URL information via DNS request logs Harry Hoffman (Oct 09)
Re: URL Logging Allowed? Harry Hoffman (Nov 11)

Havens, Lori

Sharing a Holiday Security Awareness Video Havens, Lori (Dec 12)

Henninger, Craig

CampusGuard is seeking a Security Advisor Henninger, Craig (Dec 09)

Hugh Burley

Re: inital passwords for students Hugh Burley (Dec 06)

Ian McDonald

Re: Cisco FWSM and Random Sequencing Ian McDonald (Oct 18)
Re: Macs with flashing question mark folder Ian McDonald (Oct 14)
Re: capturing full URL information via DNS request logs Ian McDonald (Oct 09)

Isabelle Grey

Re: TOR and the Digital Freedom Conversation Isabelle Grey (Dec 11)

Jacobson, Dick

Re: US Department of Justice Victim Notification System Jacobson, Dick (Nov 19)

James Farr

Calendar Reminder James Farr (Oct 02)

James H. Moore

Trying to promote security knowledge not a commercial entity - Elsevier $1 eBook sale James H. Moore (Nov 06)
Anyone using Sumuri Paladin as a part of their security strategy for investigations? James H. Moore (Nov 04)

James J Furstenberg

Re: Encryption James J Furstenberg (Nov 21)

Jason Rinne

SRP - GoToMeeting Jason Rinne (Nov 12)

Jason Todd

Vet school account compromises Jason Todd (Nov 14)

Jeff Kell

Re: Effective and Competitively Priced SIEMs Jeff Kell (Oct 07)

Jeffrey Sabin

TOR and the Digital Freedom Conversation Jeffrey Sabin (Dec 10)

Jenny Blaine

Re: reporting structure Jenny Blaine (Oct 23)

Jodi Ito

NCSAM 2013 is Wrapping Up—What's Next? Jodi Ito (Oct 31)
National Cyber Security Awareness Month 2013 is HERE! Jodi Ito (Sep 30)

Joe Barnes

Job Opening - IT Security Engineer at UIUC Joe Barnes (Nov 26)

Joel L. Rosenblatt

Re: Image, word, and password login Joel L. Rosenblatt (Dec 06)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: inital passwords for students Joel L. Rosenblatt (Dec 06)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: Reminder: Deadline to Submit Joel L. Rosenblatt (Nov 07)

Joe St Sauver

Re: Chromecast devices? Joe St Sauver (Oct 02)

John Forker

Re: Reporting Structure John Forker (Oct 24)

John K Lerchey

Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar John K Lerchey (Dec 12)

John Ladwig

Re: capturing full URL information via DNS request logs John Ladwig (Oct 10)
Re: capturing full URL information via DNS request logs John Ladwig (Oct 09)

Jones, Joshua

Chromecast devices? Jones, Joshua (Oct 02)

Jones, Mark B

Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 10)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: Do you use video conferencing for identity proofing remote students? Jones, Mark B (Nov 13)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: inital passwords for students Jones, Mark B (Dec 06)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)

Jon Robinson

Re: Google "Unusual traffic from your computer network" notification Jon Robinson (Dec 09)

Joseph Lee

Idle timer for password protected screensaver & forced logoff Joseph Lee (Oct 30)

Joseph N Kurtin

Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Joseph N Kurtin (Dec 12)

Josh Drummond

Job Opening -- IT Application Security Engineer at UC Irvine Josh Drummond (Dec 04)

Josh Flaherty

Cisco FWSM and Random Sequencing Josh Flaherty (Oct 18)
Re: Blocking phishing URL's Josh Flaherty (Dec 02)

Julian Y Koh

Re: Do you use video conferencing for identity proofing remote students? Julian Y Koh (Nov 13)
Re: Blocking phishing URL's Julian Y Koh (Dec 02)

Justin Azoff

Re: capturing full URL information via DNS request logs Justin Azoff (Oct 09)

K

Re: a question about having College ID number as part of directory information K (Nov 07)

Karl Bernard

Re: Image, word, and password login Karl Bernard (Dec 06)

Keller, Alex

Re: FireEye? Keller, Alex (Nov 06)
Re: FYI - Adobe account compromise Keller, Alex (Nov 07)

Ken Connelly

Re: Google Apps alerts protocol Ken Connelly (Oct 07)

Kevin Halgren

Active Directory DC and ADFS in the cloud? Kevin Halgren (Nov 19)

Kevin Moll

Re: Blocking phishing URL's Kevin Moll (Dec 02)
Re: Ransomware Kevin Moll (Nov 14)

Kevin Robert Hayes

Re: Checkpoint Vs. Palo Alto Vs. Fortinet Kevin Robert Hayes (Nov 04)

Kevin Wilcox

Re: capturing full URL information via DNS request logs Kevin Wilcox (Oct 09)

Khan, Sam

Re: Federal laws applicable to Universities Khan, Sam (Nov 07)

Kim Cary

Re: SECURITY Digest - 12 Dec 2013 to 16 Dec 2013 (#2013-219) Kim Cary (Dec 17)

Knights, John

Re: reporting structure Knights, John (Oct 23)

Leon DuPree

Re: Cloud Computing Survey from a Northwestern University postgraduate student Leon DuPree (Oct 16)

Long, H Morrow

Re: Federal laws applicable to Universities Long, H Morrow (Nov 07)

Louis Aponte

Re: FYI - Adobe account compromise Louis Aponte (Nov 07)

Mally Mclane

Re: Encryption Mally Mclane (Nov 20)
Re: Do you use video conferencing for identity proofing remote students? Mally Mclane (Nov 13)
Re: Blocking phishing URL's Mally Mclane (Dec 02)

Maloney, Michael

Re: Blocking phishing URL's Maloney, Michael (Dec 02)

Manjak, Martin

Re: TOR and the Digital Freedom Conversation Manjak, Martin (Dec 11)
Re: TOR and the Digital Freedom Conversation Manjak, Martin (Dec 11)

McClenon, Brady

Re: Do you use video conferencing for identity proofing remote students? McClenon, Brady (Nov 13)

McCrone, Kevin

Re: SRP - GoToMeeting McCrone, Kevin (Nov 12)

McLaughlin, Bryan S.

Re: inital passwords for students McLaughlin, Bryan S. (Dec 06)
Re: Calendar Reminder McLaughlin, Bryan S. (Oct 02)

Mclaughlin, Kevin (mclaugkl)

Re: SQRL (Re: [SECURITY] Image, word, and password login) Mclaughlin, Kevin (mclaugkl) (Dec 06)
Biometric Survey for Higher Education Mclaughlin, Kevin (mclaugkl) (Nov 23)

Mertz, Brian E

Macs with flashing question mark folder Mertz, Brian E (Oct 14)

Michael Benedetto

Re: Blocking phishing URL's Michael Benedetto (Dec 04)

Michael Cole

Re: Federal laws applicable to Universities Michael Cole (Nov 07)

Michael J. Kenney

Google "Unusual traffic from your computer network" notification Michael J. Kenney (Dec 09)

Michael Wang

World Congress on Internet Security (WorldCIS-2013): Paper Submission Deadline Extension! Michael Wang (Oct 04)

Miguel A. Glez. de la Torre

Re: SANS STH and Canvas Miguel A. Glez. de la Torre (Dec 20)

Mike Osterman

HEISC survey on Windows XP EOL plans Mike Osterman (Dec 05)

Miller,James R

Re: Remote access to SIS/ERP? Miller,James R (Dec 16)
Re: Remote access to SIS/ERP? Miller,James R (Dec 16)

Moore, Beverly Y

Do you use video conferencing for identity proofing remote students? Moore, Beverly Y (Nov 13)

Mushtaq Ali Bukhari

Job Opening: Weill Cornell Medical College in Qatar - Security Engineer Mushtaq Ali Bukhari (Oct 01)

Nadine L. Stern

New CISO position at Princeton University Nadine L. Stern (Nov 04)

Nathaniel Hall

Re: Checkpoint Vs. Palo Alto Vs. Fortinet Nathaniel Hall (Nov 01)

NICHOLAS S ROY

Excellent Java Developer Needed NICHOLAS S ROY (Nov 01)

Nick Giacobe

Re: inital passwords for students Nick Giacobe (Dec 06)

Nick Recchia

Re: SANS STH and Canvas Nick Recchia (Dec 20)
SANS VLE and Canvas Nick Recchia (Dec 20)

Omen Wild

Re: Effective and Competitively Priced SIEMs Omen Wild (Oct 07)
FireEye? Omen Wild (Nov 06)

Palmer, Kevin J.

Re: Do you use video conferencing for identity proofing remote students? Palmer, Kevin J. (Nov 13)

Paul Chauvet

Re: Ransomware Paul Chauvet (Nov 14)

Pete Hickey

Re: Small cheap custom phishing Pete Hickey (Nov 12)

Peter Setlak

Re: Cisco FWSM and Random Sequencing Peter Setlak (Oct 18)

Philip Webster

Re: capturing full URL information via DNS request logs Philip Webster (Oct 09)

pmorley () mcdaniel edu

Re: a question about having College ID number as part of directory information pmorley () mcdaniel edu (Nov 07)

Randall C Grimshaw

Re: Google "Unusual traffic from your computer network" notification Randall C Grimshaw (Dec 09)

randy

Re: Do you use video conferencing for identity proofing remote students? randy (Nov 13)

Richard H Gadsden

Security Analyst Positions - Medical University of South Carolina (Charleston, SC) Richard H Gadsden (Nov 11)

Rich Graves

Re: capturing full URL information via DNS request logs Rich Graves (Oct 09)
Re: URL Logging Allowed? Rich Graves (Nov 11)

Roger A Safian

Re: Cloud Computing Survey from a Northwestern University postgraduate student Roger A Safian (Oct 15)
Re: a question about having College ID number as part of directory information Roger A Safian (Nov 07)
Re: Cloud Computing Survey Roger A Safian (Oct 24)
Re: capturing full URL information via DNS request logs Roger A Safian (Oct 09)
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Roger A Safian (Nov 04)
Re: Do you use video conferencing for identity proofing remote students? Roger A Safian (Nov 13)
Duo admin API Roger A Safian (Oct 25)
Re: Ransomware Roger A Safian (Nov 14)
Re: a question about having College ID number as part of directory information Roger A Safian (Nov 07)

Rosenthal, Jane E.

Re: SECURITY Digest - Federal Laws and IT Rosenthal, Jane E. (Nov 08)

Roy Galang

Re: a question about having College ID number as part of directory information Roy Galang (Nov 07)
a question about having College ID number as part of directory information Roy Galang (Nov 07)

Russ Leathe

Certified? Russ Leathe (Oct 29)
PCI-DSS 3.0 Russ Leathe (Dec 17)
reporting structure Russ Leathe (Oct 23)

Ryan Hiebert

Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert (Dec 06)
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert (Dec 07)

Ryan Skelton

Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Ryan Skelton (Dec 12)

SCHALIP, MICHAEL

Re: Encryption SCHALIP, MICHAEL (Nov 20)
Re: Chromecast devices? SCHALIP, MICHAEL (Oct 10)

Self, Dennis

Re: Encryption Self, Dennis (Nov 21)

Semmens, Theresa

Re: US Department of Justice Victim Notification System Semmens, Theresa (Nov 19)

Shahra Meshkaty

Ransomware Shahra Meshkaty (Nov 13)

Shalla, Kevin

Re: TOR and the Digital Freedom Conversation Shalla, Kevin (Dec 11)
Re: TOR and the Digital Freedom Conversation Shalla, Kevin (Dec 11)

Shamblin, Quinn

Re: File sharing settings with cloud collaboration tools Shamblin, Quinn (Nov 06)
Re: Data Governance Program Resources Shamblin, Quinn (Oct 11)
Re: Ransomware Shamblin, Quinn (Nov 14)
Re: Encryption Shamblin, Quinn (Nov 20)

Shaw, David J

Re: Federal laws applicable to Universities Shaw, David J (Nov 07)

Shettler, David

Re: capturing full URL information via DNS request logs Shettler, David (Oct 09)

Stein, Nico Alexander

Re: Blocking phishing URL's Stein, Nico Alexander (Dec 04)
Re: Blocking phishing URL's Stein, Nico Alexander (Dec 02)

Steve Bohrer

Re: Small cheap custom phishing Steve Bohrer (Nov 12)
Small cheap custom phishing Steve Bohrer (Nov 12)

Steven Bochniewicz

Re: Chromecast devices? Steven Bochniewicz (Oct 02)

Stevens, Eric J.

Re: inital passwords for students Stevens, Eric J. (Dec 06)

Theresa Rowe

Re: Remote access to SIS/ERP? Theresa Rowe (Dec 16)

Thomas Munson

Re: Blocking phishing URL's Thomas Munson (Dec 04)

Tim Doty

Re: TOR and the Digital Freedom Conversation Tim Doty (Dec 11)
Re: TOR and the Digital Freedom Conversation Tim Doty (Dec 11)
Re: TOR and the Digital Freedom Conversation Tim Doty (Dec 11)

Tracy Beth Mitrano

Re: Federal laws applicable to Universities Tracy Beth Mitrano (Nov 07)
Re: TOR and the Digital Freedom Conversation Tracy Beth Mitrano (Dec 11)

Ullman, Catherine

Blocking phishing URL's Ullman, Catherine (Dec 02)
Re: Blocking phishing URL's Ullman, Catherine (Dec 02)

Valdis Kletnieks

Re: reporting structure Valdis Kletnieks (Oct 24)

Valerie Vogel

Invitation to Submit a Proposal for the EDUCAUSE Security Professionals Conference 2014 Valerie Vogel (Oct 31)
Re: reporting structure Valerie Vogel (Oct 23)
Information Security ECAR Research Bulletin Publicly Available Valerie Vogel (Nov 15)
Re: Data Governance Program Resources Valerie Vogel (Oct 11)
Security 2014 CFP Deadline: Thursday, Nov. 14 Valerie Vogel (Nov 13)
Re: Federal laws applicable to Universities Valerie Vogel (Nov 07)
Re: Biometric Survey for Higher Education Valerie Vogel (Dec 16)
Re: National Cyber Security Awareness Month 2013 is HERE! Valerie Vogel (Oct 01)
Reminder: Deadline to Submit Valerie Vogel (Nov 07)
Start Planning Now for Data Privacy Month 2014 (January 28-February 28) Valerie Vogel (Nov 22)
NCSAM 2013 Mid-Month Update Valerie Vogel (Oct 22)
Free ACE Webinar on Cybersecurity: November 18 Valerie Vogel (Nov 13)

Watkins, Lewis

Re: Reporting Structure Watkins, Lewis (Oct 24)

Weston, Brett

Re: Ransomware Weston, Brett (Nov 14)

Will Froning

Re: capturing full URL information via DNS request logs Will Froning (Oct 09)

William Quan

Re: Encryption William Quan (Nov 21)
Encryption William Quan (Nov 20)

Williams, Charles

Re: TOR and the Digital Freedom Conversation Williams, Charles (Dec 11)

Yemi Omole

Cloud Computing Survey from a Northwestern University postgraduate student Yemi Omole (Oct 15)

Yost, Davis

inital passwords for students Yost, Davis (Dec 06)
Re: inital passwords for students Yost, Davis (Dec 06)

Youngquist, Jason R.

Re: capturing full URL information via DNS request logs Youngquist, Jason R. (Oct 10)
capturing full URL information via DNS request logs Youngquist, Jason R. (Oct 09)