Educause Security Discussion: by date

240 messages starting Jul 03 13 and ending Sep 30 13
Date index | Thread index | Author index


Wednesday, 03 July

Re: Firewalls Peter Setlak
Account & Identity Management Peter Setlak
Targeted Phishing Attempt: Fake Blackboard Notification Thorpe, Glenn

Friday, 05 July

Re: Account & Identity Management Chris Green
help Edgar Gonzalez
SET SECURITY DIGEST Edgar Gonzalez
Re: help Drew Perry
Passphrases v Password Cathy Hubbs
Yahoo.com mail abuse reporting Kevin Halgren
Re: Passphrases v Password Will Froning
Re: Passphrases v Password Joel L. Rosenblatt
Re: Passphrases v Password randy
Re: Passphrases v Password Rich Graves
Re: Passphrases v Password SCHALIP, MICHAEL
Re: Passphrases v Password Rich Graves
Re: Passphrases v Password Lisciotti, Kevin
Re: Passphrases v Password Cathy Hubbs
Re: Passphrases v Password Will Froning
Re: Passphrases v Password Rich Graves
Re: Passphrases v Password Mike Osterman
Re: Passphrases v Password Michael Sinatra
Re: Passphrases v Password Steven Alexander
Re: Passphrases v Password Steven Alexander
Re: Passphrases v Password Cathy Hubbs
Re: Passphrases v Password scott hollatz

Saturday, 06 July

Re: Passphrases v Password Ray McClure

Sunday, 07 July

Re: passwords vs. passphrases Geoffrey Steven Nathan

Monday, 08 July

Re: Passphrases v Password Tim Doty
Re: Passphrases v Password randy
Re: Passphrases v Password Tim Doty
Securing a public/open linux shell server Lisciotti, Kevin
Re: Securing a public/open linux shell server Jason Gates
Re: Securing a public/open linux shell server Valdis Kletnieks
Re: Securing a public/open linux shell server Harry Hoffman
Re: Securing a public/open linux shell server Will Froning
Re: Securing a public/open linux shell server Everett, Alex D
Re: Securing a public/open linux shell server Lisciotti, Kevin

Tuesday, 09 July

Re: Passphrases v Password shanna leonard
Re: Passphrases v Password Steven Alexander
Mac security options David Opitz
Re: Mac security options Sherry Callahan
Re: Mac security options Nevin, David

Wednesday, 10 July

Re: Firewalls Chris Golden
Re: Firewalls Bob Williamson
Re: Firewalls John Kaftan
window closes July 31 for REN-ISAC-discounted SANS training Doug Pearson

Thursday, 11 July

Re: Firewalls Chris Davis
Re: Firewalls Bradley, Stephen
Job opening: UC Berkeley - Security Analyst 4 - IS Assessments Kate Riley
Job posting: UC Berkeley, IT Security Analyst 4 - IS Operations Allison Henry

Friday, 12 July

Re: Firewalls Chris Davis
Re: Firewalls randy

Sunday, 14 July

Re: Firewalls Nathaniel Hall
Re: Firewalls Nathaniel Hall

Monday, 15 July

Securing Computer Labs Self, Dennis

Tuesday, 16 July

Re: Securing Computer Labs Shamblin, Quinn
Bit9 - Trust Based Security - Feedback Greg Schmalhofer
Re: Bit9 - Trust Based Security - Feedback Joel L. Rosenblatt
Ideas for a Security Awareness 'Poster & Sticker' Campaign Kain, Jennifer
Bit9 and other whitelisting history Gene Spafford
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Kevin Wilcox
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Russ Leathe
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Felecia Vlahos
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Ben Woelk
Re: Bit9 - Trust Based Security - Feedback Hudson, Edward
Re: Bit9 - Trust Based Security - Feedback Mike Osterman
Re: Bit9 - Trust Based Security - Feedback Joel L. Rosenblatt
Re: Bit9 - Trust Based Security - Feedback Rich Graves

Wednesday, 17 July

Article in today's NYT - cybersecurity Theresa Rowe
Re: Article in today's NYT - cybersecurity Willis Marti
Re: Article in today's NYT - cybersecurity Theresa Rowe
Fake Xerox Message | 07-17-2013 Thorpe, Glenn
Re: Fake Xerox Message | 07-17-2013 Isabelle Graham
Re: Fake Xerox Message | 07-17-2013 Bob Bayn
Re: Article in today's NYT - cybersecurity Peter Setlak
Re: Fake Xerox Message | 07-17-2013 Robert Meyers
Re: Firewalls Alan Nord
Re: Fake Xerox Message | 07-17-2013 Bob Bayn
Re: Fake Xerox Message | 07-17-2013 Justin Bennett
Travel abroad, equipment, etc. Shettler, David
Re: Travel abroad, equipment, etc. mccalluq
Re: Travel abroad, equipment, etc. Roger A Safian
Re: Travel abroad, equipment, etc. Lorenz, Eva
Re: Article in today's NYT - cybersecurity Joe St Sauver

Thursday, 18 July

Re: Travel abroad, equipment, etc. Scott, Charlie
Records Retention Tools and Processes Dean Halter
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Valerie Vogel
Re: Article in today's NYT - cybersecurity Willis Marti

Monday, 22 July

Save the Date: Security 2014, May 6-8 Valerie Vogel

Wednesday, 24 July

National Cyber Security Awareness Month is just around the corner... Jodi Ito
Two factor authentication for Sharepoint Flynn, Gary - flynngn
Re: Two factor authentication for Sharepoint Jeff Kell

Friday, 26 July

Video surveillance for testing centers Di Fabio, Andrea

Saturday, 27 July

Recent (since July 2013) Phishing vs. University accounts Gary Warner

Tuesday, 30 July

P2PE Validated solutions - FYI Kevin Halgren

Wednesday, 31 July

Considering EventTracker Self, Dennis

Friday, 02 August

Crisis & Incident Management Training Peter Setlak
UNM Hospitals has an opening for an ITSecurity Analyst II. David Grisham

Wednesday, 07 August

LiveText contract provisions? Sam Hooker
Re: LiveText contract provisions? Angela Embree
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Amanda Williams
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Valerie Vogel
Re: Ideas for a Security Awareness 'Poster & Sticker' Campaign Matthew Milliron

Thursday, 08 August

Re: Crisis & Incident Management Training Kevin Halgren

Friday, 09 August

IT Acquisition Policy, Procedures and Guidelines Carlos Lobato

Monday, 12 August

Unbelievable...Urgent Help! Farrell Gerbode
Re: Unbelievable...Urgent Help! Keller, Alex

Tuesday, 13 August

Re: Save the Date: Security 2014, May 6-8 Valerie Vogel

Wednesday, 14 August

Become a Champion: National Cyber Security Awareness Month 2013 Valerie Vogel

Friday, 16 August

netID lengths Shalla, Kevin
Re: netID lengths Bristol, Gary L.
Re: netID lengths Roger A Safian
Re: netID lengths Dr. Wole Akpose
Re: netID lengths Ken Connelly
Re: netID lengths Semmens, Theresa
Re: netID lengths Charlie Derr
Re: Considering EventTracker Foerst, Daniel P.
Re: Considering EventTracker Self, Dennis
Re: Considering EventTracker Ruth Ginzberg
Re: Considering EventTracker William Quan
Re: netID lengths Pete Hickey

Monday, 19 August

World Congress on Internet Security (WorldCIS-2013): Call for Submissions! Michael Wang
Job Postings for University of North Carolina Everett, Alex D
Re: Considering EventTracker Blake Penn
annual AUP acknowledgement required? Michael J. Kenney
Re: annual AUP acknowledgement required? Michael Benedetto
Re: annual AUP acknowledgement required? Roger A Safian
IdentityFinder - Data Discovery Software Carlos Lobato

Tuesday, 20 August

[SECURITY] Berman, Mark
[SECURITY] Eric C. Lukens
Re: IdentityFinder - Data Discovery Software Valerie Vogel
Banner Data Defense/AuditVault and Database Firewall Josh Flaherty

Wednesday, 21 August

do your former employees get to keep their email address? Bob Bayn
Re: do your former employees get to keep their email address? Sherry Callahan
Re: do your former employees get to keep their email address? Pete Hickey
Re: do your former employees get to keep their email address? Shalla, Kevin
Re: do your former employees get to keep their email address? Roger A Safian
Re: do your former employees get to keep their email address? W. Greg Price, Sr.
Re: do your former employees get to keep their email address? John K Lerchey
Re: do your former employees get to keep their email address? Tim Doty
Re: do your former employees get to keep their email address? Shamblin, Quinn
Re: do your former employees get to keep their email address? Tim Faircloth
Re: netID lengths McLaughlin, Bryan S.
Re: do your former employees get to keep their email address? John C. Roberts
Re: do your former employees get to keep their email address? Walter Moore
Re: do your former employees get to keep their email address? John C. Roberts

Thursday, 22 August

China conference scam Di Fabio, Andrea
Re: China conference scam Shalla, Kevin
Re: China conference scam Manuel Amaral
Re: China conference scam Id 81046
Re: China conference scam Lorenz, Eva
Re: China conference scam Manjak, Martin

Friday, 23 August

Linux Managed Full Disk Encryption JR Ramirez
Re: Linux Managed Full Disk Encryption Valerie Vogel

Monday, 26 August

World Congress on Internet Security (WorldCIS-2013): Call for Submissions! Paul Kelly

Tuesday, 27 August

NYU Job Posting: Security Awareness Specialist Brian J Smith-Sweeney
(C)ISO Lists Kris Monroe
EDUCAUSE Connect: Seeking Mobile, BYOE Presentations with Security, Risk Focus by 8/30 Valerie Vogel

Wednesday, 28 August

ping/tracert tools? Russ Leathe
Re: IdentityFinder - Data Discovery Software Wilkins, Vern W
VASCAN Conference 2013 Streit, Doug

Thursday, 29 August

Re: IdentityFinder - Data Discovery Software Kyle Crain
Re: IdentityFinder - Data Discovery Software Ben Woelk
Re: (C)ISO Lists Shamblin, Quinn
Re: IdentityFinder - Data Discovery Software Volz, Donald D
Re: (C)ISO Lists Hendra Hendrawan
Become a NCSAM Champion David C. Lyon
Re: Become a NCSAM Champion W. Royce Hackett

Friday, 30 August

Ryland Fellowships and Balestri Scholarship Available (Apply by Sep. 9) Valerie Vogel
jimdo(.)com surges ahead of webs(.)com as a favorite of phishers. Bob Bayn
Re: jimdo(.)com surges ahead of webs(.)com as a favorite of phishers. Roger A Safian
End-user Awareness Baseline(s) Eckrote, Jennifer
Re: End-user Awareness Baseline(s) Ben Woelk
Re: End-user Awareness Baseline(s) Valerie Vogel
Re: End-user Awareness Baseline(s) Valdis Kletnieks

Tuesday, 03 September

Re: jimdo(.)com surges ahead of webs(.)com as a favorite of phishers. Clouse, Michael J

Wednesday, 04 September

Re: jimdo(.)com surges ahead of webs(.)com as a favorite of phishers. Robert Meyers
Next IAM Online: Sep. 11, Multifactor Authentication Valerie Vogel
Re: jimdo(.)com surges ahead of webs(.)com as a favorite of phishers. Roger A Safian

Thursday, 05 September

Two-Factor Authentication Peter Setlak
Re: Two-Factor Authentication Dennis Bolton
Re: Two-Factor Authentication David Curry
Re: Two-Factor Authentication David Escalante
Re: Two-Factor Authentication Harry Hoffman
Re: Two-Factor Authentication Peter Setlak

Monday, 09 September

Re: jimdo(.)com surges ahead of webs(.)com as a favorite of phishers. Greg Williams
Re: Two-Factor Authentication William G. Thompson, Jr.

Tuesday, 10 September

Duo/OpenAM/ForgeRock Roger A Safian

Thursday, 12 September

Sharing files Brandon Payne
Re: Sharing files Shalla, Kevin
Re: Sharing files Harry Hoffman
Re: Sharing files Stevens, Eric J.
Re: Sharing files Valerie Vogel
Re: Sharing files Bradley, Stephen
Re: Sharing files DiGrazia, Mick A
Re: Sharing files Bohlk, Christopher J.
Re: Sharing files Larry Thomas
Re: Sharing files Larry Thomas
Re: Sharing files Jones, Mark B
Re: Become a NCSAM Champion Valerie Vogel
Re: Become a NCSAM Champion Barrett, Bruce R.
Re: Become a NCSAM Champion Valerie Vogel

Friday, 13 September

Re: NYU Job Posting: Security Awareness Specialist Brian J Smith-Sweeney
checklist for hosted services or applications Mark Reboli
Re: checklist for hosted services or applications Harry Hoffman
Re: Sharing files Brandon Payne
HIPAA Omnibus rule and Google (or any other Cloud service provider) Mig Hofmann
Re: Sharing files Joe Formoso
Job opening: UC Berkeley - Information Security Assessment Specialist Kate Riley
Re: HIPAA Omnibus rule and Google (or any other Cloud service provider) Dr. Wole Akpose

Sunday, 15 September

Re: HIPAA Omnibus rule and Google (or any other Cloud service provider) Dan Han

Tuesday, 17 September

Re: checklist for hosted services or applications Brad Judy
CLM System Pedersen, Krystal
Re: checklist for hosted services or applications David Grisham
Re: HIPAA Omnibus rule and Google (or any other Cloud service provider) Mig Hofmann

Wednesday, 18 September

ERP Specific Security Audit requirements Drake, Craig
NCSAM 2013 - Share Your Events & Activities Valerie Vogel
Job Opportunity - University of Illinois IT Security Analyst - Short Window to Apply Barnes, Joe

Tuesday, 24 September

Countdown to National Cyber Security Awareness Month Starts Today Valerie Vogel

Wednesday, 25 September

SUNY New Paltz Job Posting: Information Security Officer Paul Chauvet
Recommended Reading & Podcasts on InfoSec, IT, Privacy Valerie Vogel

Thursday, 26 September

Web Browsing Security Bohlk, Christopher J.
are you seeing lots of Yolasite(.)com phish links? I complained and got this response. Bob Bayn
Re: are you seeing lots of Yolasite(.)com phish links? I complained and got this response. Roger A Safian
Re: Web Browsing Security David Gillett
Re: are you seeing lots of Yolasite(.)com phish links? I complained and got this response. Keith Risinger
Re: Web Browsing Security Tim Doty
Re: Web Browsing Security Jeff Kell
Re: Web Browsing Security Tim Doty
Re: Web Browsing Security Omen Wild
Re: Web Browsing Security Jeff Kell

Friday, 27 September

Re: Web Browsing Security Isabelle Graham
Next IAM Online Webinar - October 9: Passwords and Beyond Valerie Vogel

Monday, 30 September

Secure Web Gateway Bohlk, Christopher J.
Re: Secure Web Gateway Thorpe, Glenn
Re: Secure Web Gateway King, Ronald A.
Re: Secure Web Gateway Ben Parker
Re: Secure Web Gateway Barros, Jacob
Re: Secure Web Gateway Shandon Bates
NCSAM 2013 Starts Tomorrow! Valerie Vogel