K-12

37d5f81e2277051bc17116221040d51c

Students Getting Cyberwise to Become Safe and Responsible Digital Citizens

February 14, 2013 Added by:Robert Siciliano

Australian Prime Minister Julia Gillard unveils the new cyber education module, which was developed in partnership with McAfee and Life Education Australia.

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Not So Tweet and Innocent: Social Networking Security Webinar

June 19, 2012 Added by:Kelly Colgan

In conjunction with the National PTA Convention, Tim Woda will present about the specific risks plaguing parents and ways to mitigate their concerns. Matt Cullina will unveil findings from a Harris Interactive survey of parents about their child’s social networking habits and what issues cause them the most fear...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Search Engine Doesn’t Need Kid's Social Security Numbers

April 06, 2011 Added by:Robert Siciliano

Americans have become accustomed to handing over the last four digits of their SSN as an identifier. The coder or marketer at Google who believes it’s reasonable to request the last four digits of children’s SSNs probably readily shares his or her number, which is not a good idea...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Education Sector is Failing Security

May 13, 2010 Added by:Anthony M. Freed

“The Social Security numbers of about 30,000 people became vulnerable after malicious software attacked Penn State University computers,” announced the headlines in December 2009. “Other data breaches occurred in January and February and in December 2008. One targeted a single computer; the two others affected hundreds of individuals.”

Comments  (21)

B32b392ce3a707f05f4838c48c67d9cf

Good enough security?

October 29, 2009 Added by:Christopher Hudel

We have had 802.1x -- CISCO + Active Directory Integration --  in place for over a year know and it is largely a success; windows systems automatically obtain machine certificates (machines automatically receive certificates when they join the domain), supplicants exist for our IP Phones, and those devices (i.e.: printers)  that are currently incapable of 802.1x are split off in a tightl...

Comments  (2)

B038fefd7a19c26505d1f0671609d8ce

IT Security - Defense in Depth Protection using a Data-centric Model

October 29, 2009 Added by:Mike Cuppett

Start aligning your security strategy to better protect your organization's most critical asset - data. While many security proponents lean toward an outside-in strategy - protect every computer in the company from the outside world first - we really need to understand that the data is the asset that must be protected first and foremost.  The outside-in strategy starts at a macro level and ov...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Where are the DBAs?

October 07, 2009 Added by:Infosec Island Admin

What I really want to know is this: Where are the Database Admins (DBAs) these days? I cant tell you how many times in the past 18 months that I’ve found real enterprises running vulnerable databases with default passwords, weak passwords and no real permissions management.

Comments  (3)