Educause Security Discussion: by date
262 messages
starting Sep 30 13 and
ending Dec 20 13
Date index |
Thread index |
Author index
Monday, 30 September
National Cyber Security Awareness Month 2013 is HERE! Jodi Ito
Tuesday, 01 October
Job Opening: Weill Cornell Medical College in Qatar - Security Engineer Mushtaq Ali Bukhari
Re: National Cyber Security Awareness Month 2013 is HERE! Valerie Vogel
Wednesday, 02 October
Chromecast devices? Jones, Joshua
Calendar Reminder James Farr
Re: Calendar Reminder McLaughlin, Bryan S.
Re: Chromecast devices? Joe St Sauver
Re: Chromecast devices? Steven Bochniewicz
Re: Chromecast devices? Emery Rudolph
Thursday, 03 October
Re: Chromecast devices? Brian Helman
Friday, 04 October
Effective and Competitively Priced SIEMs Bohlk, Christopher J.
World Congress on Internet Security (WorldCIS-2013): Paper Submission Deadline Extension! Michael Wang
Monday, 07 October
Google Apps alerts protocol Emily Harris
Re: Google Apps alerts protocol Ken Connelly
Re: Effective and Competitively Priced SIEMs Omen Wild
Re: Effective and Competitively Priced SIEMs Jeff Kell
Tuesday, 08 October
Data Governance Program Resources Carlos Lobato
Wednesday, 09 October
Re: Chromecast devices? Dexter Caldwell
Re: Chromecast devices? Brian Helman
capturing full URL information via DNS request logs Youngquist, Jason R.
Re: Chromecast devices? Dexter Caldwell
Re: capturing full URL information via DNS request logs Harry Hoffman
Re: capturing full URL information via DNS request logs Shettler, David
Re: capturing full URL information via DNS request logs Roger A Safian
Re: capturing full URL information via DNS request logs Ian McDonald
Re: capturing full URL information via DNS request logs Rich Graves
Re: capturing full URL information via DNS request logs Will Froning
Re: capturing full URL information via DNS request logs Harry Hoffman
Re: capturing full URL information via DNS request logs Justin Azoff
Re: capturing full URL information via DNS request logs Kevin Wilcox
Re: capturing full URL information via DNS request logs Dave Koontz
Re: capturing full URL information via DNS request logs John Ladwig
Re: capturing full URL information via DNS request logs Philip Webster
Thursday, 10 October
Re: Google Apps alerts protocol Emily Harris
Re: Chromecast devices? SCHALIP, MICHAEL
Re: capturing full URL information via DNS request logs Youngquist, Jason R.
Re: capturing full URL information via DNS request logs John Ladwig
Re: Google Apps alerts protocol Ben Marsden
Friday, 11 October
Re: Data Governance Program Resources Shamblin, Quinn
Annual Conference Community and Constituent Group Lounge Brian Helman
Re: Data Governance Program Resources Valerie Vogel
Monday, 14 October
Macs with flashing question mark folder Mertz, Brian E
Re: Macs with flashing question mark folder Ian McDonald
Tuesday, 15 October
Cloud Computing Survey from a Northwestern University postgraduate student Yemi Omole
Re: Cloud Computing Survey from a Northwestern University postgraduate student Roger A Safian
Wednesday, 16 October
Re: Cloud Computing Survey from a Northwestern University postgraduate student Leon DuPree
Network AuthN @ Public Research Universities? Carr, Michael G
OSHA Required Hazard Communication Di Fabio, Andrea
Friday, 18 October
Cisco FWSM and Random Sequencing Josh Flaherty
Re: Cisco FWSM and Random Sequencing Ian McDonald
Re: Cisco FWSM and Random Sequencing Peter Setlak
making intranet content available to outside sources Ashfield, Matt (NBCC)
REN-ISAC and SANS NCSAM Webcast October 28 Beth Young
Monday, 21 October
Re: Cisco FWSM and Random Sequencing Chris Green
Tuesday, 22 October
NCSAM 2013 Mid-Month Update Valerie Vogel
end point and credit protection Alex Jalso
Wednesday, 23 October
reporting structure Russ Leathe
Re: reporting structure Knights, John
Re: reporting structure Chris Vakhordjian
Re: reporting structure Jenny Blaine
Re: reporting structure George Farah
Re: reporting structure Valerie Vogel
Thursday, 24 October
Re: Reporting Structure John Forker
Re: reporting structure Valdis Kletnieks
Re: Reporting Structure Watkins, Lewis
Cloud Computing Survey Babayemi Omole
Re: Cloud Computing Survey Roger A Safian
Friday, 25 October
Cloud Computing Survey Babayemi Omole
Duo admin API Roger A Safian
Tuesday, 29 October
Certified? Russ Leathe
Wednesday, 30 October
Idle timer for password protected screensaver & forced logoff Joseph Lee
Thursday, 31 October
Invitation to Submit a Proposal for the EDUCAUSE Security Professionals Conference 2014 Valerie Vogel
NCSAM 2013 is Wrapping Up—What's Next? Jodi Ito
Friday, 01 November
Excellent Java Developer Needed NICHOLAS S ROY
Job Posting: IT Security Architect - University of Iowa Drews, Jane E
Checkpoint Vs. Palo Alto Vs. Fortinet Allan Nelson
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Nathaniel Hall
Monday, 04 November
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Roger A Safian
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Kevin Robert Hayes
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Bradley, Stephen
FISMA Bohlk, Christopher J.
New CISO position at Princeton University Nadine L. Stern
Anyone using Sumuri Paladin as a part of their security strategy for investigations? James H. Moore
Tuesday, 05 November
File sharing settings with cloud collaboration tools Dan Han
Wednesday, 06 November
Re: File sharing settings with cloud collaboration tools Shamblin, Quinn
Trying to promote security knowledge not a commercial entity - Elsevier $1 eBook sale James H. Moore
FYI - Adobe account compromise Andrew Daviel
FireEye? Omen Wild
Re: FireEye? Keller, Alex
Thursday, 07 November
a question about having College ID number as part of directory information Roy Galang
Re: a question about having College ID number as part of directory information pmorley () mcdaniel edu
Re: a question about having College ID number as part of directory information Roger A Safian
Re: a question about having College ID number as part of directory information Roy Galang
Re: FYI - Adobe account compromise Brian Helman
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Brian Helman
Re: a question about having College ID number as part of directory information Roger A Safian
Reminder: Deadline to Submit Valerie Vogel
Re: a question about having College ID number as part of directory information Chris Green
Re: FYI - Adobe account compromise Keller, Alex
Re: a question about having College ID number as part of directory information K
Re: FYI - Adobe account compromise Louis Aponte
Federal laws applicable to Universities Francisco Pérez
Re: Reminder: Deadline to Submit Joel L. Rosenblatt
Re: Federal laws applicable to Universities Michael Cole
Re: Federal laws applicable to Universities Carr, Michael G
Re: Federal laws applicable to Universities Tracy Beth Mitrano
Re: Federal laws applicable to Universities Francisco Pérez
Re: Federal laws applicable to Universities Valerie Vogel
Re: Federal laws applicable to Universities Feehan, Patrick
Re: Federal laws applicable to Universities Khan, Sam
Re: Federal laws applicable to Universities Carlos Lobato
Re: Federal laws applicable to Universities Long, H Morrow
Re: Federal laws applicable to Universities Shaw, David J
Re: Federal laws applicable to Universities Dan Han
Friday, 08 November
Re: SECURITY Digest - Federal Laws and IT Rosenthal, Jane E.
Sunday, 10 November
Re: FYI - Adobe account compromise Brian Helman
Monday, 11 November
URL Logging Allowed? Gramke, Jim
Re: URL Logging Allowed? Harry Hoffman
Re: URL Logging Allowed? Rich Graves
Security Analyst Positions - Medical University of South Carolina (Charleston, SC) Richard H Gadsden
Re: FYI - Adobe account compromise Gary Warner
Re: FYI - Adobe account compromise Brian Helman
Tuesday, 12 November
Re: FYI - Adobe account compromise Gary Warner
job posting: REN-ISAC Principal Security Engineer Doug Pearson
SRP - GoToMeeting Jason Rinne
Re: SRP - GoToMeeting McCrone, Kevin
REN-ISAC ALERT: Threat to institutional computer accounts by the Adobe breach Doug Pearson
Small cheap custom phishing Steve Bohrer
Re: Small cheap custom phishing Pete Hickey
Re: Small cheap custom phishing Steve Bohrer
Wednesday, 13 November
Re: Small cheap custom phishing Albert Lunde
Security 2014 CFP Deadline: Thursday, Nov. 14 Valerie Vogel
Do you use video conferencing for identity proofing remote students? Moore, Beverly Y
Re: Do you use video conferencing for identity proofing remote students? Roger A Safian
Re: Do you use video conferencing for identity proofing remote students? McClenon, Brady
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson
Re: Do you use video conferencing for identity proofing remote students? Mally Mclane
Re: Do you use video conferencing for identity proofing remote students? Flynn, Gary - flynngn
Free ACE Webinar on Cybersecurity: November 18 Valerie Vogel
Re: Do you use video conferencing for identity proofing remote students? Julian Y Koh
Re: Do you use video conferencing for identity proofing remote students? Palmer, Kevin J.
Re: Do you use video conferencing for identity proofing remote students? Charles Buchholtz
Re: Do you use video conferencing for identity proofing remote students? randy
Re: Do you use video conferencing for identity proofing remote students? Jones, Mark B
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson
Ransomware Shahra Meshkaty
Thursday, 14 November
Re: Ransomware Kevin Moll
Re: Ransomware Shamblin, Quinn
Re: Ransomware Roger A Safian
Re: Ransomware Weston, Brett
Re: Ransomware Paul Chauvet
Vet school account compromises Jason Todd
Friday, 15 November
Information Security ECAR Research Bulletin Publicly Available Valerie Vogel
REN-ISAC/SANS Aggregate purchase program webcast Beth Young
Tuesday, 19 November
Re: US Department of Justice Victim Notification System Semmens, Theresa
Active Directory DC and ADFS in the cloud? Kevin Halgren
Seen this? Gene Spafford
Re: US Department of Justice Victim Notification System Jacobson, Dick
Wednesday, 20 November
Encryption William Quan
Re: Encryption Shamblin, Quinn
Re: Encryption Chris Green
Re: Encryption Mally Mclane
Re: Encryption Chris Green
Re: Encryption SCHALIP, MICHAEL
Thursday, 21 November
Re: Encryption Dan Han
Re: Encryption James J Furstenberg
Re: Encryption William Quan
Re: Encryption Self, Dennis
Friday, 22 November
WildCard Certificates Gramke, Jim
Re: WildCard Certificates Gramke, Jim
Re: WildCard Certificates Dexter Caldwell
Re: WildCard Certificates Dexter Caldwell
Digication and google OpenID Eric Weakland
Start Planning Now for Data Privacy Month 2014 (January 28-February 28) Valerie Vogel
Job posting - VCU Senior Info Sec Analyst Dan Han
Saturday, 23 November
Biometric Survey for Higher Education Mclaughlin, Kevin (mclaugkl)
Tuesday, 26 November
Job Posting - Univ of KY (UK) Network Security Analyst Carr, Michael G
Job Opening - IT Security Engineer at UIUC Joe Barnes
Monday, 02 December
Blocking phishing URL's Ullman, Catherine
Re: Blocking phishing URL's Stein, Nico Alexander
Re: Blocking phishing URL's Kevin Moll
Re: Blocking phishing URL's Josh Flaherty
Re: Blocking phishing URL's Julian Y Koh
Re: Blocking phishing URL's Mally Mclane
Re: Blocking phishing URL's Bob Bayn
Re: Blocking phishing URL's Maloney, Michael
Re: Blocking phishing URL's Eric Schewe
Re: Blocking phishing URL's Ullman, Catherine
Tuesday, 03 December
help Dan Peterson
Wednesday, 04 December
Re: Blocking phishing URL's Thomas Munson
Re: Blocking phishing URL's Michael Benedetto
Re: Blocking phishing URL's Stein, Nico Alexander
Job Opening -- IT Application Security Engineer at UC Irvine Josh Drummond
Thursday, 05 December
HEISC survey on Windows XP EOL plans Mike Osterman
Friday, 06 December
inital passwords for students Yost, Davis
Re: inital passwords for students Joel L. Rosenblatt
Re: inital passwords for students David Curry
Re: inital passwords for students Stevens, Eric J.
Re: inital passwords for students Yost, Davis
Re: inital passwords for students Nick Giacobe
Re: inital passwords for students Hugh Burley
Re: inital passwords for students Dan Schwartz
Re: inital passwords for students Jones, Mark B
Re: inital passwords for students David Curry
Re: inital passwords for students Barron Hulver
Re: inital passwords for students David Curry
Re: inital passwords for students McLaughlin, Bryan S.
Image, word, and password login Derek Diget
Re: Image, word, and password login Joel L. Rosenblatt
Re: Image, word, and password login Karl Bernard
SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert
Re: SQRL (Re: [SECURITY] Image, word, and password login) Mclaughlin, Kevin (mclaugkl)
Saturday, 07 December
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert
Monday, 09 December
Google "Unusual traffic from your computer network" notification Michael J. Kenney
Re: SQRL (Re: [SECURITY] Image, word, and password login) Clouse, Michael J
Remote access to SIS/ERP? David Curry
Re: Google "Unusual traffic from your computer network" notification Randall C Grimshaw
CampusGuard is seeking a Security Advisor Henninger, Craig
Re: Google "Unusual traffic from your computer network" notification Jon Robinson
Tuesday, 10 December
TOR and the Digital Freedom Conversation Jeffrey Sabin
Re: inital passwords for students Don Faulkner
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Wednesday, 11 December
Re: TOR and the Digital Freedom Conversation Tim Doty
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Isabelle Grey
Re: TOR and the Digital Freedom Conversation Shalla, Kevin
Re: TOR and the Digital Freedom Conversation Tracy Beth Mitrano
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Shalla, Kevin
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Tim Doty
Re: TOR and the Digital Freedom Conversation Tim Doty
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation David Escalante
Re: TOR and the Digital Freedom Conversation Manjak, Martin
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Williams, Charles
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Manjak, Martin
Thursday, 12 December
Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Joseph N Kurtin
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Ryan Skelton
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Alexander W. Miranda
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar John K Lerchey
Sharing a Holiday Security Awareness Video Havens, Lori
Monday, 16 December
Re: Biometric Survey for Higher Education Valerie Vogel
Re: Remote access to SIS/ERP? Theresa Rowe
Re: Remote access to SIS/ERP? Miller,James R
Re: Remote access to SIS/ERP? Miller,James R
Re: Remote access to SIS/ERP? Hanson, Mike
Tuesday, 17 December
PCI-DSS 3.0 Russ Leathe
Re: SECURITY Digest - 12 Dec 2013 to 16 Dec 2013 (#2013-219) Kim Cary
Friday, 20 December
uptick in http scanning? Brian Helman
SANS VLE and Canvas Nick Recchia
Re: SANS STH and Canvas Nick Recchia
Re: SANS STH and Canvas Miguel A. Glez. de la Torre