...

Security & Privacy


Carnegie Mellon Hosts Security Contest for Middle and High School Students

The second annual picoCTF competition dares students in grades 6-12 to "reverse engineer, break, hack, decrypt or do whatever it takes" to solve computer challenges.

SchoolDude's CrisisManager Puts Safety Plans on User Devices

Education technology company SchoolDude has entered the school security segment with the introduction of CrisisManager, an application that allows administrators to make emergency plans available on users' iOS and Android mobile devices.

Miami School Adopts Student Device Management App

A school in Miami, FL is the first formal customer for a new application intended to manage student access to the Internet.

iBoss MobileEther Now Supports Apple's Device Enrollment Program

Apple DEP streamlines MDM for institutionally owned devices, and integration with MobileEther adds an additional layer of security by transparently binding each device with user-specific Web and application security policies.

Gartner: Mobile Apps Ripe for Security Exploitation

Through the end of 2015, more than three-quarters of mobile apps will fail "basic security tests," according to IT research firm Gartner.

Edsys Intros School Bus Tracking

Edsys has introduced real-time tracking software that lets parents and teachers monitor the location of students riding on school buses.

Texas District Snares Vandal 2 Days after IP Camera Installation

The Liberty-Eylau Independent School District has gone public with its adoption of a video surveillance system that helped in identifying a criminal act on campus two days after installation.

Nebraska District Extends Security with Cameras and Door Access Control

A small Nebraska school district has gone public with an upgrade in security from the use of an analog digital video recorder camera system in its high school building to track vandalism and doors locked by key to a surveillance system with dozens of network cameras and door secured with readers and controllers.

iboss Network Security Adds Single Sign-On Feature

User-based authentication is intended to help with policy enforcement and regulatory compliance, as well as detecting malware on devices.

Report: IT Leaders Need To Improve Reporting on Security Investments

With the advent of malicious software that can be purchased online and an underground infrastructure that can be used to set off targeted attacks, cyber security threats are becoming more "democratized," and therefore more likely to gain visibility beyond the walls of the data center. That can lead to more enlightened thinking among executive management about investing in security measures, said Research Director Lawrence Pingree during a Gartner security and risk management summit being held in Australia this week.

Whitepapers