Educause Security Discussion: by date
268 messages
starting Oct 01 14 and
ending Dec 24 14
Date index |
Thread index |
Author index
Wednesday, 01 October
funny video on avoiding copyright infringement Shalla, Kevin
Re: funny video on avoiding copyright infringement Self, Dennis
Re: funny video on avoiding copyright infringement Greg Jackson
Re: funny video on avoiding copyright infringement Chris Garriss
Re: funny video on avoiding copyright infringement Harry Zahlis
Thursday, 02 October
Contact at RedSeal Eric Weakland
NMSU - Cybersecurity Month Activities Carlos Lobato
Syr.Edu - Cybersecurity Month Activities Randall C Grimshaw
Friday, 03 October
Re: Syr.Edu - Cybersecurity Month Activities Harry Hoffman
Re: Syr.Edu - Cybersecurity Month Activities Ken Connelly
Re: Syr.Edu - Cybersecurity Month Activities Frank Barton
NCSAM 2014: Week 1 Update Valerie Vogel
Re: NCSAM 2014: Week 1 Update Mitcham, Zachery S.
Monday, 06 October
Annual Security Report Dan Sarazen
Re: Annual Security Report Sturgis, John (John Sturgis)
DRP Shaun Gray
Re: DRP Valerie Vogel
Re: Annual Security Report Nick Lewis
Proxy stealing journal access Andrew Daviel
Risk management study Jim Hietala
Re: Proxy stealing journal access Keller, Alex
Tuesday, 07 October
Re: Proxy stealing journal access Fulton, Lora
Re: Proxy stealing journal access Rajewski, Jonathan
Re: Proxy stealing journal access Roger A Safian
Re: Proxy stealing journal access Tim Doty
Pearson MyLab - SSL issues Fowler, Becky Thurmond
Re: Proxy stealing journal access Gary Warner
Get Study Room site Alex Jalso
Re: Get Study Room site Alex Waitkus
Re: Get Study Room site Jones, Mark B
Internet2 Update Regarding Shellshock Paul Howell
Re: DRP Shaun Gray
Wednesday, 08 October
Re: Syr.Edu - Cybersecurity Month Activities Plesco, Todd
Free NCSAM Webinar on 10/14: CIO Insights on Cybersecurity Valerie Vogel
Any thoughts on BitSight Security Ratings/Scores? Jeff McCabe
Re: Get Study Room site Kevin Halgren
Re: Get Study Room site Beyette, Jeremy
Re: Get Study Room site Leland Lyerla
Friday, 10 October
Deprecation of SSL Certificates Using SHA-1 Roger A Safian
Re: Deprecation of SSL Certificates Using SHA-1 Tim Faircloth
Re: Deprecation of SSL Certificates Using SHA-1 John Ladwig
Re: Deprecation of SSL Certificates Using SHA-1 Ken Connelly
Sharing Files Securely with External Parties Knights, John
Re: Sharing Files Securely with External Parties Kevin Kelly
Re: Deprecation of SSL Certificates Using SHA-1 Roger A Safian
Re: Deprecation of SSL Certificates Using SHA-1 Miguel Angel Gonzalez de la Torre
Re: Deprecation of SSL Certificates Using SHA-1 Miller, Thomas
Sunday, 12 October
Re: Sharing Files Securely with External Parties Plesco, Todd
Monday, 13 October
Re: Sharing Files Securely with External Parties Wisdom, Michelle M.
Re: Sharing Files Securely with External Parties Mark Powell
Re: Deprecation of SSL Certificates Using SHA-1 Albert Lunde
Ohio University Information Technology Security Seminar Dalton, Matthew
Risk Based Authentication Pardonek, Jim
Tuesday, 14 October
Re: Sharing Files Securely with External Parties Kevin P. Sale
NCSAM 2014: Mid-Month Update Valerie Vogel
Wednesday, 15 October
Re: Sharing Files Securely with External Parties Knights, John
Fwd: POODLE: SSLv3.0 vulnerability (CVE-2014-3566) Paul Howell
Re: ISO27002 vs ISO27006 Leon DuPree
Thursday, 16 October
Re: POODLE: SSLv3.0 vulnerability (CVE-2014-3566) Alan Amesbury
Who manages your antivirus. Jeff Borton
Re: Who manages your antivirus. David Seidl
Re: Who manages your antivirus. Renee Peters
Re: Who manages your antivirus. Mike Cunningham
Re: POODLE: SSLv3.0 vulnerability (CVE-2014-3566) Keller, Alex
Re: Who manages your antivirus. Knights, John
Friday, 17 October
Re: Who manages your antivirus. King, Ronald A.
Re: Who manages your antivirus. Williams, Matthew (wilmh)
Monday, 20 October
Free Webinar, 10/21: Assessing Risks in Cloud Computing Valerie Vogel
OReilly security ebook discount Brad Judy
Vendor Network Access John Kaftan
Re: Vendor Network Access Scott Link
Tuesday, 21 October
Re: Vendor Network Access Dennis Bohn
Re: Vendor Network Access John Kaftan
ADFS Experience Thomas Carter
Re: ADFS Experience Ryan Hiebert
Re: ADFS Experience Ryan Hiebert
2 Job Postings: Information Security Manager & Director of Information Security, University of Chicago Medical Center Erik Decker
Re: ADFS Experience Nicholas Roy
Re: ADFS Experience Miguel Angel Gonzalez de la Torre
Re: ADFS Experience Kevin Halgren
Re: Who manages your antivirus. Kevin Halgren
Re: ADFS Experience Miguel Angel Gonzalez de la Torre
Job Posting: InfoSec Security Analyst at Oregon St. Univ. Nevin, David
Wednesday, 22 October
Senior security analyst/security engineer job descriptions. David D Grisham
Thursday, 23 October
REN-ISAC ALERT: Muzzling POODLE (While Cleaning Up Other Related Vulnerabilities, Too) Doug Pearson
Re: Ransomware Ashfield, Matt (NBCC)
Banner Data Guard / VMWare / Zerto (Zert0) / Veeam Thomas S Wolfe
Re: Ransomware David Hale
Re: Ransomware Chris Green
Re: Ransomware Cook, Dale
Re: Banner Data Guard / VMWare / Zerto (Zert0) / Veeam Richard Siedzik
RPKI workshop at I2 TechX Michael Sinatra
Friday, 24 October
Re: Ransomware Flynn, Gary - flynngn
Cyber Security Awareness Month fun Lanita Rae Collette
Re: Cyber Security Awareness Month fun Barrett, Bruce
Re: Cyber Security Awareness Month fun Bob Bayn
Re: Cyber Security Awareness Month fun Ken Connelly
Re: Cyber Security Awareness Month fun David James Anderson
Monday, 27 October
Re: Cyber Security Awareness Month fun Greene, Allen
Response to phishing e-mails Leland Lyerla
Re: Response to phishing e-mails Bob Bayn
Re: Response to phishing e-mails Roger A Safian
Re: Response to phishing e-mails Manjak, Martin
Re: Response to phishing e-mails Colleen Blaho
Re: Response to phishing e-mails Brad Judy
Re: Response to phishing e-mails Joel Anderson
Re: Response to phishing e-mails Bob Bayn
Re: Response to phishing e-mails Garmon, Joel
Tuesday, 28 October
Re: Response to phishing e-mails Thomas Carter
Re: Response to phishing e-mails Robert Meyers
Re: Response to phishing e-mails Nick Semenkovich
Re: Response to phishing e-mails Brandon Hume
Wednesday, 29 October
Re: Response to phishing e-mails Robert Meyers
Re: Response to phishing e-mails Thomas Carter
Re: Response to phishing e-mails Nick Semenkovich
Re: Response to phishing e-mails Paul Chauvet
Awareness/Compliance Tracking Software Pardonek, Jim
Re: Awareness/Compliance Tracking Software Erik Decker
Re: Response to phishing e-mails Brandon Hume
Re: Awareness/Compliance Tracking Software DiGrazia, Mick A
Re: Response to phishing e-mails Nick Semenkovich
Firewall Vendors Kubb, Richard
Re: Firewall Vendors King, Ronald A.
Re: Firewall Vendors Manuel Amaral
Re: Response to phishing e-mails Brandon Hume
Re: Firewall Vendors T. Shayne Ghere
Re: Firewall Vendors Garmon, Joel
Re: Firewall Vendors Walter Petruska
Re: Firewall Vendors Jeremy Kurtz
Re: Firewall Vendors Rich Graves
Re: Firewall Vendors Jason Cook
Re: Firewall Vendors Jason Cook
Re: Response to phishing e-mails Jones, Mark B
Re: Response to phishing e-mails Kalal, Robert (Bob)
Thursday, 30 October
Re: Firewall Vendors Ramon Hermida
Re: Firewall Vendors David Escalante
Re: Firewall Vendors King, Ronald A.
Re: Firewall Vendors Roger A Safian
Re: Response to phishing e-mails Paul Chauvet
Re: Firewall Vendors Bob Williamson
Re: Firewall Vendors Michael Horne
Re: Firewall Vendors Tornoe, Eric J.
Re: Firewall Vendors Dennis Bohn
Re: Firewall Vendors Kurtz, Eric
Re: Firewall Vendors Ben Parker
Re: Firewall Vendors Tornoe, Eric J.
Friday, 31 October
Onboarding John Kaftan
Uploading photo for IDs John Kaftan
Re: Onboarding Kevin Halgren
Re: Uploading photo for IDs Behun, Michael
Re: Uploading photo for IDs Thomas Carter
Re: Uploading photo for IDs Jenny Blaine
Re: Onboarding Jones, Mark B
Re: Response to phishing e-mails Nick Semenkovich
Saturday, 01 November
Re: Onboarding Kevin McCormick
Monday, 03 November
NCSAM 2014 is Wrapping Up‹What¹s Next? Valerie Vogel
Wednesday, 05 November
Re: Awareness/Compliance Tracking Software Donna Volpe Strouse
Invitation to Submit Proposals for the 2015 Security Professionals Conference (by 11/17) Valerie Vogel
Position available - Network Services Director at the University of Wisconsin Richard Kunert
Thursday, 06 November
Re: Firewall Vendors Brian Helman
Monday, 10 November
IAM Online Nov 12: Turning Off Legacy Technology (2 pm ET) Valerie Vogel
Position Available: Chief Information Security Officer (CISO) at Ithaca College Valerie Vogel
Tuesday, 11 November
20 Critical Controls survey request from American University of Beirut (AUB) randy
Wednesday, 12 November
Internet2 NET+ CloudProud� Webinar on Resource & Staffing 11/13/14, 1 pm ET Valerie Vogel
REN ISAC public advisory issued Joanna Grama
Re: Firewall Vendors Dexter Caldwell
2-factor authentication survey. Youngquist, Jason R.
Thursday, 13 November
SSL certificate purchasing Thomas Carter
Re: SSL certificate purchasing Mike Cunningham
Re: SSL certificate purchasing Jones, Mark B
Re: SSL certificate purchasing King, Ronald A.
Re: SSL certificate purchasing Leonard Nelson
Re: SSL certificate purchasing Thomas Carter
Re: SSL certificate purchasing Thomas Carter
Re: SSL certificate purchasing Mike Cunningham
Re: SSL certificate purchasing Maloney, Michael
Re: SSL certificate purchasing David Lundy
Re: SSL certificate purchasing Glassman, Stephen
Re: SSL certificate purchasing Judd, Taylor Allen
Re: SSL certificate purchasing Mark Montague
Re: SSL certificate purchasing Roger A Safian
Re: SSL certificate purchasing Baumgartner, Mark A.
Re: SSL certificate purchasing David Lundy
Re: SSL certificate purchasing Nick Semenkovich
Re: Response to phishing e-mails Andrew Daviel
Friday, 14 November
Re: Firewall Vendors Tornoe, Eric J.
Re: Firewall Vendors Tornoe, Eric J.
Monday, 17 November
Re: Invitation to Submit Proposals for the 2015 Security Professionals Conference (by 11/17) Valerie Vogel
Wednesday, 19 November
Google Hacking Greene, Allen
Re: Google Hacking Brad Judy
Re: Google Hacking Greene, Allen
Re: Google Hacking David James Anderson
Re: Google Hacking Jason Todd
Re: Google Hacking Keller, Alex
Thursday, 20 November
Re: 2-factor authentication survey. Youngquist, Jason R.
Negligence for privacy/security breach standard in tort Tracy Beth Mitrano
Friday, 21 November
National Cybersecurity Network Workforce Summit, Dec. 1-2 at UMass Boston Valerie Vogel
Re: Negligence for privacy/security breach standard in tort Shackelford, Scott James
Re: Google Hacking Greene, Allen
Tuesday, 25 November
REN-ISAC / SANS Aggregate purchase program Doug Pearson
SolarWinds LEM Langford, Matthew
Wednesday, 26 November
12/2/2014 Webcast: REN-ISAC / SANS Aggregate purchase program Milford, Kim
VA TECH SANS ONSITE - Mark your calendars randy
Re: VA TECH SANS ONSITE - Mark your calendars Ken Connelly
Re: VA TECH SANS ONSITE - Mark your calendars randy
VA Tech SANS Onsite - forgot to mention ... randy
Re: VA TECH SANS ONSITE - Mark your calendars Ernie Soffronoff
Re: VA TECH SANS ONSITE - Mark your calendars Ken Connelly
Tuesday, 02 December
Evolution and Ascent of the CISO: New EDUCAUSE Review Article Valerie Vogel
Wednesday, 03 December
HEISC Update: 2014 Accomplishments & 2015 Priorities Valerie Vogel
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities Barrett, Bruce
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities Valerie Vogel
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities Larry Thomas
Re: HEISC Update: 2014 Accomplishments & 2015 Priorities George Farah
Job Posting - University of Washington - Teaching position Scott Barker
Thursday, 04 December
IAM Online Dec. 10 - Are Passwords Passe? Valerie Vogel
Friday, 05 December
cyber security liability insurance Alex Jalso
Brief Cyberbullying Survey - Your Response is Requested Julie Luker
Checkpoint 13500 Next Generation Firewall/Security Timothy Pierson
Saturday, 06 December
Re: Checkpoint 13500 Next Generation Firewall/Security Ian McDonald
Monday, 08 December
Checkpoint 13500 Next Generation Firewall/Security Boyd, Daniel
Re: Checkpoint 13500 Next Generation Firewall/Security Timothy Pierson
Re: Checkpoint 13500 Next Generation Firewall/Security Timothy Pierson
Re: Checkpoint 13500 Next Generation Firewall/Security Flynn, Gary - flynngn
Re: Checkpoint 13500 Next Generation Firewall/Security Robert Rudloff
Tuesday, 09 December
DLP Best Practices PERRY II, JAMES
Re: DLP Best Practices Brad Judy
Data Destruction/Secure Deletion Frank Barton
Wednesday, 10 December
Start a New Cyber Adventure in Moscow! Parks, Mitch (mitch () uidaho edu)
*Reminder* - Cyberbullying Survey - Your Response is Needed Julie Luker
Thursday, 11 December
SSH logs - ip address as user? Lisciotti, Kevin
Re: SSH logs - ip address as user? David James Anderson
Vulnerability Scan RFI or RFP Self, Dennis
Re: Data Destruction/Secure Deletion Thomas S Wolfe
Uptick in SSH scanning ? Andrew Daviel
Re: Uptick in SSH scanning ? Joel L. Rosenblatt
Re: Uptick in SSH scanning ? Jason Gates
Re: Uptick in SSH scanning ? Laurie Zirkle
Re: Uptick in SSH scanning ? Michael Benedetto
Friday, 12 December
Re: Uptick in SSH scanning ? Joseph Tam
Tuesday, 16 December
Establishing the Program Committee for Security 2016 Valerie Vogel
Wednesday, 17 December
Linux Grinch attack Lisciotti, Kevin
Re: Linux Grinch attack Colleen Blaho
Re: Linux Grinch attack Everett, Alex D
Student/Staff Email Knights, John
Re: Student/Staff Email Jones, Mark B
Re: Student/Staff Email Jeff Choo
Re: Student/Staff Email Bob Bayn
Thursday, 18 December
Re: Student/Staff Email Theresa Rowe
Re: Student/Staff Email Knights, John
Re: Student/Staff Email Miguel Angel Gonzalez de la Torre
Re: Student/Staff Email Jones, Mark B
CDS Spotlight: Information Security - Now Publicly Available Valerie Vogel
Re: Job opening: UC Berkeley - Security Analyst IV - Application Security Testing (2 year appointment, 2 positions) Leon DuPree
Re: Uptick in SSH scanning ? Justin C. Klein Keane
Re: Linux Grinch attack Boyd, Daniel
Re: Linux Grinch attack Pete Hickey
Re: Uptick in SSH scanning ? Livio Ricciulli
Friday, 19 December
AD and Domain Admin Policy? Russ Leathe
Re: AD and Domain Admin Policy? Brad Judy
Re: AD and Domain Admin Policy? Dugan, Darin D [ITSYS]
Re: AD and Domain Admin Policy? Timothy Pierson
Re: AD and Domain Admin Policy? Timothy Pierson
Large community college district researching patch management Ric Getter
Sr. Information Security Engineer - University of Chicago Medicine Erik Decker
Monday, 22 December
Re: AD and Domain Admin Policy? Kevin McCormick
Cisco Advisory NTP Multiple Vulnerabilities Kevin McCormick
Wednesday, 24 December
NIST NCCOE recommending WEP for Wireless Medical Infusion Pump Security? Shawn Merdinger