Tag Archive: Information Security

UC’s Learning Data Privacy Principles Gaining National Attention

By Jim Phillips and Jim Williamson. Our campuses are awash in data, and there are many initiatives underway to capture, store, and use that data for analysis, predictions, and, in some cases, prescriptive action(s) based on those predictions. When an…
Read more about UC’s Learning Data Privacy Principles Gaining National Attention

UC and Cisco Enter Long-Term Partnership for Innovation

city skyline with wifi symbols

By Yvonne Tevis. In April 2018, the University of California and Cisco signed a three-year strategic partnership agreement, formally recognizing an informal relationship of twenty-years’ standing, and committing to innovative programs for mutual benefit. The partnership is an offshoot of…
Read more about UC and Cisco Enter Long-Term Partnership for Innovation

Proposals Sought for Information Security Symposium

Audience gathering in the Mondavi for the keynote speech at the 2017 symposium.

By Bill Buchanan The Information Security Symposium at UC Davis, a popular and low-cost source of ideas, new information, and networking for UC security and compliance professionals, is now accepting proposals for the 2019 conference. The event will take place…
Read more about Proposals Sought for Information Security Symposium

What Does Europe’s New Privacy Law Mean for UC?

A circle of stars surrounding a lock

By Scott Seaborn. On May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) went live, significantly changing the international privacy landscape and raising the regulatory stakes for institutions and companies working with the personal data of persons in Europe.  …
Read more about What Does Europe’s New Privacy Law Mean for UC?

Money, Mayhem, Mortality: A Cyber Tale

By Yvonne Tevis. It was a stormy night on the Dark Web. But on a sunny UC campus one morning, Jack Tern was plowing through email. The ‘replies-to-all’ were driving him batty. So much work piling up, meetings to arrange, invoices…
Read more about Money, Mayhem, Mortality: A Cyber Tale

Tips for Selecting & Managing Passwords

Hand grabbing password out of binary code

By Michelle Phung, Isabelle Nguyen and Julie Goldstein. Passwords are the key to almost everything you do online, and you probably have multiple passwords that you use throughout the day. Choosing hard-to-hack passwords and managing them securely can sometimes seem…
Read more about Tips for Selecting & Managing Passwords

IET Team behind Project to Help Syrian Refugees Reclaim Right to Education

Among those who worked on the technology for Article 26 Backpack are, from left to right, Shawn DeArmond, web architect; web developers Carson Black and Jeroen Post; and project manager Erie Comer.

A team from Information and Educational Technology is behind a very human project that launched in June to help Syrian refugees in Lebanon reclaim their right to education. Web developers did the custom programming for the Article 26 Backpack,…
Read more about IET Team behind Project to Help Syrian Refugees Reclaim Right to Education