Quantcast
Browsing all 22 articles
Browse latest View live

IT Security Metrics Shed Light on Progress

In hopes of better understanding the IT security situation at Cornell, the IT Security Office has started collecting metrics: To identify areas within the university that seem to have...

View Article


Types of Compromises Seen On Campus, Including Areas of Greatest Risk

At Cornell, as is commonly the case everywhere, the person, rather than the system, is the avenue of compromise. Drive by downloads, dominated by scams and fraudware, attempt to prey upon people rather...

View Article


Agenda: June IT Security SIG Wednesday, 6/6/12

Agenda Updates from the IT Security Office Metrics Incident Response, part 2 IT Training Discussion Bomgar presentation Kerberos presentation Future topics Asset recovery Shares, permissions and best...

View Article

Facts Learned About NetID Credential Compromises

NetID credential theft poses several significant risks to the individual and the university: Disruption of individual access to computing resources, change of individual settings or preferences...

View Article

Efforts Involved to Resolve Computer Compromises

Data from the IT Security Office (ITSO) supports our notion that most departments resolve incidents when first notified and that systems don’t reappear in their compromised state. In departments where...

View Article


December IT Security SIG Wednesday, 12/5/2012

10:30-noon Weill Hall Room 226 Updates from the ITSO office Regulated Data Chart presentation Note: this will be an abbreviated SIG, but all who are interested are encouraged to attend to hear the...

View Article

Security Alert: Universal Plug and Play Device Vulnerability

(This security alert has been sent to net-admin-l. This issue does affect all Universal Plug and Play devices, including those in the home environment; home devices will not be protected by the Cornell...

View Article

Security Alert: Update Java (*See Kronos Note)

Oracle has released an update for Java that fixes 50 security holes, including a critical hole currently being exploited in the wild. If Java is already installed on your computer, the IT Security...

View Article


March 2013 IT Security SIG

The March IT Security SIG will be Wednesday, March 6 from 10:30 AM to 12:00 noon in Weill 226. March SIG Topics: ITSO updates Recent Activity – Phishing, Java, etc. SEP server: Usage & Stats review...

View Article


April Security SIG 4/3/13

April IT Security SIG Wednesday, 4/3/2013, 10:30-noon, 226 Weill Hall Agenda Updates from the ITSO office Introduction of Rob Bandler as Deputy Director of ITSO Overview of lunch-n-learn presentations...

View Article

IT Security Lunch and Learn: Securely Retiring and Recycling Your Computer

Have you ever wondered about the most ecological and secure way to dispose of a computer that’s reached the end of its usability? Or wanted to learn more about processes and services available at...

View Article

Cornell Teaching with Technology News, May 2013

The latest news about the tools and techniques available to support teaching at Cornell can be found in the Teaching with Technology newsletter from Academic Technologies....

View Article

Image may be NSFW.
Clik here to view.

Two Talks on What’s Watched and Who’s Watching Online

The Cornell University Computer Policy and Law Program (UCPL) will host two talks in September focusing on online privacy, security, and related issues at Cornell and around the world. The talks will...

View Article


Forum: Law, Policy, and Security Issues with Information Technology and the...

Tuesday, September 10, 2013, 7:30-9pm 251 Malott Hall This open discussion forum will invite comments and questions about privacy, cybersecurity, security espionage, national security, government...

View Article

Four NEW Cyber Security Awareness Resources

Happy National Cyber Security Awareness Month! This week, we’ve shared four new cyber security resources on our social media pages, including a *funny* cartoon about security questions and a video...

View Article


Cyber Security Awareness Resources – Week of 10/7

Happy National Cyber Security Awareness Month! This week, we’ve shared five new cyber security resources on our social media pages, including an xkcd.com cartoon that shows why long passphrases work so...

View Article

November IT Security SIG 11/6

November IT Security SIG Wednesday, 11/6/2013 10:30-noon Weill Hall Room 226 Below is the agenda for next week’s Security SIG. One of the topics is an open discussion around the end-of-life of Windows...

View Article


December IT Security SIG 12/4

December IT Security SIG Wednesday, 12/4/2013 10:30-noon Weill Hall Room 226 Agenda Advancing Access to Restricted Data (CISER & CRADC) FERPA and HIPAA review Windows XP follow up “Last Seen”...

View Article

February IT Security SIG Wednesday, 2/5

February IT Security SIG Wednesday, 2/5/2014 10:30-noon Weill Hall Room 224 (Please note the room change.) Agenda ITSO Updates Review of Alerts SafeDNS Security Awareness Update Worst passwords for...

View Article

Software Development SIG Call for March Presenters

The Software Development Special Interest Group (SD-SIG) is seeking volunteers to present at our next SD-SIG meeting in March — date/time flexible. A possible topic may be application stack comparisons...

View Article
Browsing all 22 articles
Browse latest View live