Educause Security Discussion: by author
262 messages
starting Nov 13 13 and
ending Oct 09 13
Date index |
Thread index |
Author index
Albert Lunde
Re: Small cheap custom phishing Albert Lunde (Nov 13)
Alexander W. Miranda
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Alexander W. Miranda (Dec 12)
Alex Jalso
end point and credit protection Alex Jalso (Oct 22)
Allan Nelson
Checkpoint Vs. Palo Alto Vs. Fortinet Allan Nelson (Nov 01)
Andrew Daviel
FYI - Adobe account compromise Andrew Daviel (Nov 06)
Ashfield, Matt (NBCC)
making intranet content available to outside sources Ashfield, Matt (NBCC) (Oct 18)
Babayemi Omole
Cloud Computing Survey Babayemi Omole (Oct 24)
Cloud Computing Survey Babayemi Omole (Oct 25)
Barron Hulver
Re: inital passwords for students Barron Hulver (Dec 06)
Ben Marsden
SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden (Dec 06)
Re: Google Apps alerts protocol Ben Marsden (Oct 10)
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden (Dec 06)
Beth Young
REN-ISAC/SANS Aggregate purchase program webcast Beth Young (Nov 15)
REN-ISAC and SANS NCSAM Webcast October 28 Beth Young (Oct 18)
Bob Bayn
Re: Blocking phishing URL's Bob Bayn (Dec 02)
Bohlk, Christopher J.
Effective and Competitively Priced SIEMs Bohlk, Christopher J. (Oct 04)
FISMA Bohlk, Christopher J. (Nov 04)
Bradley, Stephen
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Bradley, Stephen (Nov 04)
Brian Helman
Re: FYI - Adobe account compromise Brian Helman (Nov 07)
Annual Conference Community and Constituent Group Lounge Brian Helman (Oct 11)
Re: FYI - Adobe account compromise Brian Helman (Nov 10)
uptick in http scanning? Brian Helman (Dec 20)
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Brian Helman (Nov 07)
Re: FYI - Adobe account compromise Brian Helman (Nov 11)
Re: Chromecast devices? Brian Helman (Oct 09)
Re: Chromecast devices? Brian Helman (Oct 03)
Carlos Lobato
Data Governance Program Resources Carlos Lobato (Oct 08)
Re: Federal laws applicable to Universities Carlos Lobato (Nov 07)
Carr, Michael G
Network AuthN @ Public Research Universities? Carr, Michael G (Oct 16)
Re: Federal laws applicable to Universities Carr, Michael G (Nov 07)
Job Posting - Univ of KY (UK) Network Security Analyst Carr, Michael G (Nov 26)
Charles Buchholtz
Re: Do you use video conferencing for identity proofing remote students? Charles Buchholtz (Nov 13)
Chris Green
Re: a question about having College ID number as part of directory information Chris Green (Nov 07)
Re: Encryption Chris Green (Nov 20)
Re: Encryption Chris Green (Nov 20)
Re: Cisco FWSM and Random Sequencing Chris Green (Oct 21)
Chris Vakhordjian
Re: reporting structure Chris Vakhordjian (Oct 23)
Clouse, Michael J
Re: SQRL (Re: [SECURITY] Image, word, and password login) Clouse, Michael J (Dec 09)
Dan Han
Re: Encryption Dan Han (Nov 21)
Re: Federal laws applicable to Universities Dan Han (Nov 07)
File sharing settings with cloud collaboration tools Dan Han (Nov 05)
Job posting - VCU Senior Info Sec Analyst Dan Han (Nov 22)
Dan Peterson
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson (Nov 13)
help Dan Peterson (Dec 03)
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson (Nov 13)
Dan Schwartz
Re: inital passwords for students Dan Schwartz (Dec 06)
Dave Koontz
Re: capturing full URL information via DNS request logs Dave Koontz (Oct 09)
David Curry
Remote access to SIS/ERP? David Curry (Dec 09)
Re: inital passwords for students David Curry (Dec 06)
Re: inital passwords for students David Curry (Dec 06)
Re: inital passwords for students David Curry (Dec 06)
David Escalante
Re: TOR and the Digital Freedom Conversation David Escalante (Dec 11)
Derek Diget
Image, word, and password login Derek Diget (Dec 06)
Dexter Caldwell
Re: WildCard Certificates Dexter Caldwell (Nov 22)
Re: Chromecast devices? Dexter Caldwell (Oct 09)
Re: Chromecast devices? Dexter Caldwell (Oct 09)
Re: WildCard Certificates Dexter Caldwell (Nov 22)
Di Fabio, Andrea
OSHA Required Hazard Communication Di Fabio, Andrea (Oct 16)
Don Faulkner
Re: inital passwords for students Don Faulkner (Dec 10)
Doug Pearson
REN-ISAC ALERT: Threat to institutional computer accounts by the Adobe breach Doug Pearson (Nov 12)
job posting: REN-ISAC Principal Security Engineer Doug Pearson (Nov 12)
Drews, Jane E
Job Posting: IT Security Architect - University of Iowa Drews, Jane E (Nov 01)
Emery Rudolph
Re: Chromecast devices? Emery Rudolph (Oct 02)
Emily Harris
Re: Google Apps alerts protocol Emily Harris (Oct 10)
Google Apps alerts protocol Emily Harris (Oct 07)
Eric Schewe
Re: Blocking phishing URL's Eric Schewe (Dec 02)
Eric Weakland
Digication and google OpenID Eric Weakland (Nov 22)
Feehan, Patrick
Re: Federal laws applicable to Universities Feehan, Patrick (Nov 07)
Flynn, Gary - flynngn
Re: Do you use video conferencing for identity proofing remote students? Flynn, Gary - flynngn (Nov 13)
Francisco Pérez
Re: Federal laws applicable to Universities Francisco Pérez (Nov 07)
Federal laws applicable to Universities Francisco Pérez (Nov 07)
Gary Warner
Re: FYI - Adobe account compromise Gary Warner (Nov 12)
Re: FYI - Adobe account compromise Gary Warner (Nov 11)
Gene Spafford
Seen this? Gene Spafford (Nov 19)
George Farah
Re: reporting structure George Farah (Oct 23)
Gramke, Jim
WildCard Certificates Gramke, Jim (Nov 22)
URL Logging Allowed? Gramke, Jim (Nov 11)
Re: WildCard Certificates Gramke, Jim (Nov 22)
Hanson, Mike
Re: Remote access to SIS/ERP? Hanson, Mike (Dec 16)
Harry Hoffman
Re: capturing full URL information via DNS request logs Harry Hoffman (Oct 09)
Re: capturing full URL information via DNS request logs Harry Hoffman (Oct 09)
Re: URL Logging Allowed? Harry Hoffman (Nov 11)
Havens, Lori
Sharing a Holiday Security Awareness Video Havens, Lori (Dec 12)
Henninger, Craig
CampusGuard is seeking a Security Advisor Henninger, Craig (Dec 09)
Hugh Burley
Re: inital passwords for students Hugh Burley (Dec 06)
Ian McDonald
Re: Cisco FWSM and Random Sequencing Ian McDonald (Oct 18)
Re: Macs with flashing question mark folder Ian McDonald (Oct 14)
Re: capturing full URL information via DNS request logs Ian McDonald (Oct 09)
Isabelle Grey
Re: TOR and the Digital Freedom Conversation Isabelle Grey (Dec 11)
Jacobson, Dick
Re: US Department of Justice Victim Notification System Jacobson, Dick (Nov 19)
James Farr
Calendar Reminder James Farr (Oct 02)
James H. Moore
Trying to promote security knowledge not a commercial entity - Elsevier $1 eBook sale James H. Moore (Nov 06)
Anyone using Sumuri Paladin as a part of their security strategy for investigations? James H. Moore (Nov 04)
James J Furstenberg
Re: Encryption James J Furstenberg (Nov 21)
Jason Rinne
SRP - GoToMeeting Jason Rinne (Nov 12)
Jason Todd
Vet school account compromises Jason Todd (Nov 14)
Jeff Kell
Re: Effective and Competitively Priced SIEMs Jeff Kell (Oct 07)
Jeffrey Sabin
TOR and the Digital Freedom Conversation Jeffrey Sabin (Dec 10)
Jenny Blaine
Re: reporting structure Jenny Blaine (Oct 23)
Jodi Ito
NCSAM 2013 is Wrapping Up—What's Next? Jodi Ito (Oct 31)
National Cyber Security Awareness Month 2013 is HERE! Jodi Ito (Sep 30)
Joe Barnes
Job Opening - IT Security Engineer at UIUC Joe Barnes (Nov 26)
Joel L. Rosenblatt
Re: Image, word, and password login Joel L. Rosenblatt (Dec 06)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: inital passwords for students Joel L. Rosenblatt (Dec 06)
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt (Dec 11)
Re: Reminder: Deadline to Submit Joel L. Rosenblatt (Nov 07)
Joe St Sauver
Re: Chromecast devices? Joe St Sauver (Oct 02)
John Forker
Re: Reporting Structure John Forker (Oct 24)
John K Lerchey
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar John K Lerchey (Dec 12)
John Ladwig
Re: capturing full URL information via DNS request logs John Ladwig (Oct 10)
Re: capturing full URL information via DNS request logs John Ladwig (Oct 09)
Jones, Joshua
Chromecast devices? Jones, Joshua (Oct 02)
Jones, Mark B
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 10)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: Do you use video conferencing for identity proofing remote students? Jones, Mark B (Nov 13)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Re: inital passwords for students Jones, Mark B (Dec 06)
Re: TOR and the Digital Freedom Conversation Jones, Mark B (Dec 11)
Jon Robinson
Re: Google "Unusual traffic from your computer network" notification Jon Robinson (Dec 09)
Joseph Lee
Idle timer for password protected screensaver & forced logoff Joseph Lee (Oct 30)
Joseph N Kurtin
Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Joseph N Kurtin (Dec 12)
Josh Drummond
Job Opening -- IT Application Security Engineer at UC Irvine Josh Drummond (Dec 04)
Josh Flaherty
Cisco FWSM and Random Sequencing Josh Flaherty (Oct 18)
Re: Blocking phishing URL's Josh Flaherty (Dec 02)
Julian Y Koh
Re: Do you use video conferencing for identity proofing remote students? Julian Y Koh (Nov 13)
Re: Blocking phishing URL's Julian Y Koh (Dec 02)
Justin Azoff
Re: capturing full URL information via DNS request logs Justin Azoff (Oct 09)
K
Re: a question about having College ID number as part of directory information K (Nov 07)
Karl Bernard
Re: Image, word, and password login Karl Bernard (Dec 06)
Keller, Alex
Re: FireEye? Keller, Alex (Nov 06)
Re: FYI - Adobe account compromise Keller, Alex (Nov 07)
Ken Connelly
Re: Google Apps alerts protocol Ken Connelly (Oct 07)
Kevin Halgren
Active Directory DC and ADFS in the cloud? Kevin Halgren (Nov 19)
Kevin Moll
Re: Blocking phishing URL's Kevin Moll (Dec 02)
Re: Ransomware Kevin Moll (Nov 14)
Kevin Robert Hayes
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Kevin Robert Hayes (Nov 04)
Kevin Wilcox
Re: capturing full URL information via DNS request logs Kevin Wilcox (Oct 09)
Khan, Sam
Re: Federal laws applicable to Universities Khan, Sam (Nov 07)
Kim Cary
Re: SECURITY Digest - 12 Dec 2013 to 16 Dec 2013 (#2013-219) Kim Cary (Dec 17)
Knights, John
Re: reporting structure Knights, John (Oct 23)
Leon DuPree
Re: Cloud Computing Survey from a Northwestern University postgraduate student Leon DuPree (Oct 16)
Long, H Morrow
Re: Federal laws applicable to Universities Long, H Morrow (Nov 07)
Louis Aponte
Re: FYI - Adobe account compromise Louis Aponte (Nov 07)
Mally Mclane
Re: Encryption Mally Mclane (Nov 20)
Re: Do you use video conferencing for identity proofing remote students? Mally Mclane (Nov 13)
Re: Blocking phishing URL's Mally Mclane (Dec 02)
Maloney, Michael
Re: Blocking phishing URL's Maloney, Michael (Dec 02)
Manjak, Martin
Re: TOR and the Digital Freedom Conversation Manjak, Martin (Dec 11)
Re: TOR and the Digital Freedom Conversation Manjak, Martin (Dec 11)
McClenon, Brady
Re: Do you use video conferencing for identity proofing remote students? McClenon, Brady (Nov 13)
McCrone, Kevin
Re: SRP - GoToMeeting McCrone, Kevin (Nov 12)
McLaughlin, Bryan S.
Re: inital passwords for students McLaughlin, Bryan S. (Dec 06)
Re: Calendar Reminder McLaughlin, Bryan S. (Oct 02)
Mclaughlin, Kevin (mclaugkl)
Re: SQRL (Re: [SECURITY] Image, word, and password login) Mclaughlin, Kevin (mclaugkl) (Dec 06)
Biometric Survey for Higher Education Mclaughlin, Kevin (mclaugkl) (Nov 23)
Mertz, Brian E
Macs with flashing question mark folder Mertz, Brian E (Oct 14)
Michael Benedetto
Re: Blocking phishing URL's Michael Benedetto (Dec 04)
Michael Cole
Re: Federal laws applicable to Universities Michael Cole (Nov 07)
Michael J. Kenney
Google "Unusual traffic from your computer network" notification Michael J. Kenney (Dec 09)
Michael Wang
World Congress on Internet Security (WorldCIS-2013): Paper Submission Deadline Extension! Michael Wang (Oct 04)
Miguel A. Glez. de la Torre
Re: SANS STH and Canvas Miguel A. Glez. de la Torre (Dec 20)
Mike Osterman
HEISC survey on Windows XP EOL plans Mike Osterman (Dec 05)
Miller,James R
Re: Remote access to SIS/ERP? Miller,James R (Dec 16)
Re: Remote access to SIS/ERP? Miller,James R (Dec 16)
Moore, Beverly Y
Do you use video conferencing for identity proofing remote students? Moore, Beverly Y (Nov 13)
Mushtaq Ali Bukhari
Job Opening: Weill Cornell Medical College in Qatar - Security Engineer Mushtaq Ali Bukhari (Oct 01)
Nadine L. Stern
New CISO position at Princeton University Nadine L. Stern (Nov 04)
Nathaniel Hall
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Nathaniel Hall (Nov 01)
NICHOLAS S ROY
Excellent Java Developer Needed NICHOLAS S ROY (Nov 01)
Nick Giacobe
Re: inital passwords for students Nick Giacobe (Dec 06)
Nick Recchia
Re: SANS STH and Canvas Nick Recchia (Dec 20)
SANS VLE and Canvas Nick Recchia (Dec 20)
Omen Wild
Re: Effective and Competitively Priced SIEMs Omen Wild (Oct 07)
FireEye? Omen Wild (Nov 06)
Palmer, Kevin J.
Re: Do you use video conferencing for identity proofing remote students? Palmer, Kevin J. (Nov 13)
Paul Chauvet
Re: Ransomware Paul Chauvet (Nov 14)
Pete Hickey
Re: Small cheap custom phishing Pete Hickey (Nov 12)
Peter Setlak
Re: Cisco FWSM and Random Sequencing Peter Setlak (Oct 18)
Philip Webster
Re: capturing full URL information via DNS request logs Philip Webster (Oct 09)
pmorley () mcdaniel edu
Re: a question about having College ID number as part of directory information pmorley () mcdaniel edu (Nov 07)
Randall C Grimshaw
Re: Google "Unusual traffic from your computer network" notification Randall C Grimshaw (Dec 09)
randy
Re: Do you use video conferencing for identity proofing remote students? randy (Nov 13)
Richard H Gadsden
Security Analyst Positions - Medical University of South Carolina (Charleston, SC) Richard H Gadsden (Nov 11)
Rich Graves
Re: capturing full URL information via DNS request logs Rich Graves (Oct 09)
Re: URL Logging Allowed? Rich Graves (Nov 11)
Roger A Safian
Re: Cloud Computing Survey from a Northwestern University postgraduate student Roger A Safian (Oct 15)
Re: a question about having College ID number as part of directory information Roger A Safian (Nov 07)
Re: Cloud Computing Survey Roger A Safian (Oct 24)
Re: capturing full URL information via DNS request logs Roger A Safian (Oct 09)
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Roger A Safian (Nov 04)
Re: Do you use video conferencing for identity proofing remote students? Roger A Safian (Nov 13)
Duo admin API Roger A Safian (Oct 25)
Re: Ransomware Roger A Safian (Nov 14)
Re: a question about having College ID number as part of directory information Roger A Safian (Nov 07)
Rosenthal, Jane E.
Re: SECURITY Digest - Federal Laws and IT Rosenthal, Jane E. (Nov 08)
Roy Galang
Re: a question about having College ID number as part of directory information Roy Galang (Nov 07)
a question about having College ID number as part of directory information Roy Galang (Nov 07)
Russ Leathe
Certified? Russ Leathe (Oct 29)
PCI-DSS 3.0 Russ Leathe (Dec 17)
reporting structure Russ Leathe (Oct 23)
Ryan Hiebert
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert (Dec 06)
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert (Dec 07)
Ryan Skelton
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Ryan Skelton (Dec 12)
SCHALIP, MICHAEL
Re: Encryption SCHALIP, MICHAEL (Nov 20)
Re: Chromecast devices? SCHALIP, MICHAEL (Oct 10)
Self, Dennis
Re: Encryption Self, Dennis (Nov 21)
Semmens, Theresa
Re: US Department of Justice Victim Notification System Semmens, Theresa (Nov 19)
Shahra Meshkaty
Ransomware Shahra Meshkaty (Nov 13)
Shalla, Kevin
Re: TOR and the Digital Freedom Conversation Shalla, Kevin (Dec 11)
Re: TOR and the Digital Freedom Conversation Shalla, Kevin (Dec 11)
Shamblin, Quinn
Re: File sharing settings with cloud collaboration tools Shamblin, Quinn (Nov 06)
Re: Data Governance Program Resources Shamblin, Quinn (Oct 11)
Re: Ransomware Shamblin, Quinn (Nov 14)
Re: Encryption Shamblin, Quinn (Nov 20)
Shaw, David J
Re: Federal laws applicable to Universities Shaw, David J (Nov 07)
Shettler, David
Re: capturing full URL information via DNS request logs Shettler, David (Oct 09)
Stein, Nico Alexander
Re: Blocking phishing URL's Stein, Nico Alexander (Dec 04)
Re: Blocking phishing URL's Stein, Nico Alexander (Dec 02)
Steve Bohrer
Re: Small cheap custom phishing Steve Bohrer (Nov 12)
Small cheap custom phishing Steve Bohrer (Nov 12)
Steven Bochniewicz
Re: Chromecast devices? Steven Bochniewicz (Oct 02)
Stevens, Eric J.
Re: inital passwords for students Stevens, Eric J. (Dec 06)
Theresa Rowe
Re: Remote access to SIS/ERP? Theresa Rowe (Dec 16)
Thomas Munson
Re: Blocking phishing URL's Thomas Munson (Dec 04)
Tim Doty
Re: TOR and the Digital Freedom Conversation Tim Doty (Dec 11)
Re: TOR and the Digital Freedom Conversation Tim Doty (Dec 11)
Re: TOR and the Digital Freedom Conversation Tim Doty (Dec 11)
Tracy Beth Mitrano
Re: Federal laws applicable to Universities Tracy Beth Mitrano (Nov 07)
Re: TOR and the Digital Freedom Conversation Tracy Beth Mitrano (Dec 11)
Ullman, Catherine
Blocking phishing URL's Ullman, Catherine (Dec 02)
Re: Blocking phishing URL's Ullman, Catherine (Dec 02)
Valdis Kletnieks
Re: reporting structure Valdis Kletnieks (Oct 24)
Valerie Vogel
Invitation to Submit a Proposal for the EDUCAUSE Security Professionals Conference 2014 Valerie Vogel (Oct 31)
Re: reporting structure Valerie Vogel (Oct 23)
Information Security ECAR Research Bulletin Publicly Available Valerie Vogel (Nov 15)
Re: Data Governance Program Resources Valerie Vogel (Oct 11)
Security 2014 CFP Deadline: Thursday, Nov. 14 Valerie Vogel (Nov 13)
Re: Federal laws applicable to Universities Valerie Vogel (Nov 07)
Re: Biometric Survey for Higher Education Valerie Vogel (Dec 16)
Re: National Cyber Security Awareness Month 2013 is HERE! Valerie Vogel (Oct 01)
Reminder: Deadline to Submit Valerie Vogel (Nov 07)
Start Planning Now for Data Privacy Month 2014 (January 28-February 28) Valerie Vogel (Nov 22)
NCSAM 2013 Mid-Month Update Valerie Vogel (Oct 22)
Free ACE Webinar on Cybersecurity: November 18 Valerie Vogel (Nov 13)
Watkins, Lewis
Re: Reporting Structure Watkins, Lewis (Oct 24)
Weston, Brett
Re: Ransomware Weston, Brett (Nov 14)
Will Froning
Re: capturing full URL information via DNS request logs Will Froning (Oct 09)
William Quan
Re: Encryption William Quan (Nov 21)
Encryption William Quan (Nov 20)
Williams, Charles
Re: TOR and the Digital Freedom Conversation Williams, Charles (Dec 11)
Yemi Omole
Cloud Computing Survey from a Northwestern University postgraduate student Yemi Omole (Oct 15)
Yost, Davis
inital passwords for students Yost, Davis (Dec 06)
Re: inital passwords for students Yost, Davis (Dec 06)
Youngquist, Jason R.
Re: capturing full URL information via DNS request logs Youngquist, Jason R. (Oct 10)
capturing full URL information via DNS request logs Youngquist, Jason R. (Oct 09)