Home page logo
/

262 messages starting Oct 01 13 and ending Dec 20 13
Date index | Thread index | Author index

Tuesday, 01 October

National Cyber Security Awareness Month 2013 is HERE! Jodi Ito
Job Opening: Weill Cornell Medical College in Qatar - Security Engineer Mushtaq Ali Bukhari
Re: National Cyber Security Awareness Month 2013 is HERE! Valerie Vogel

Wednesday, 02 October

Chromecast devices? Jones, Joshua
Calendar Reminder James Farr
Re: Calendar Reminder McLaughlin, Bryan S.
Re: Chromecast devices? Joe St Sauver
Re: Chromecast devices? Steven Bochniewicz
Re: Chromecast devices? Emery Rudolph

Friday, 04 October

Re: Chromecast devices? Brian Helman
Effective and Competitively Priced SIEMs Bohlk, Christopher J.
World Congress on Internet Security (WorldCIS-2013): Paper Submission Deadline Extension! Michael Wang

Monday, 07 October

Google Apps alerts protocol Emily Harris
Re: Google Apps alerts protocol Ken Connelly
Re: Effective and Competitively Priced SIEMs Omen Wild
Re: Effective and Competitively Priced SIEMs Jeff Kell

Tuesday, 08 October

Data Governance Program Resources Carlos Lobato

Wednesday, 09 October

Re: Chromecast devices? Dexter Caldwell
Re: Chromecast devices? Brian Helman
capturing full URL information via DNS request logs Youngquist, Jason R.
Re: Chromecast devices? Dexter Caldwell
Re: capturing full URL information via DNS request logs Harry Hoffman
Re: capturing full URL information via DNS request logs Shettler, David
Re: capturing full URL information via DNS request logs Roger A Safian
Re: capturing full URL information via DNS request logs Ian McDonald
Re: capturing full URL information via DNS request logs Rich Graves
Re: capturing full URL information via DNS request logs Will Froning
Re: capturing full URL information via DNS request logs Harry Hoffman
Re: capturing full URL information via DNS request logs Justin Azoff
Re: capturing full URL information via DNS request logs Kevin Wilcox
Re: capturing full URL information via DNS request logs Dave Koontz
Re: capturing full URL information via DNS request logs John Ladwig

Thursday, 10 October

Re: capturing full URL information via DNS request logs Philip Webster
Re: Google Apps alerts protocol Emily Harris
Re: Chromecast devices? SCHALIP, MICHAEL
Re: capturing full URL information via DNS request logs Youngquist, Jason R.
Re: capturing full URL information via DNS request logs John Ladwig
Re: Google Apps alerts protocol Ben Marsden

Friday, 11 October

Re: Data Governance Program Resources Shamblin, Quinn
Annual Conference Community and Constituent Group Lounge Brian Helman
Re: Data Governance Program Resources Valerie Vogel

Monday, 14 October

Macs with flashing question mark folder Mertz, Brian E
Re: Macs with flashing question mark folder Ian McDonald

Tuesday, 15 October

Cloud Computing Survey from a Northwestern University postgraduate student Yemi Omole
Re: Cloud Computing Survey from a Northwestern University postgraduate student Roger A Safian

Wednesday, 16 October

Re: Cloud Computing Survey from a Northwestern University postgraduate student Leon DuPree
Network AuthN @ Public Research Universities? Carr, Michael G
OSHA Required Hazard Communication Di Fabio, Andrea

Friday, 18 October

Cisco FWSM and Random Sequencing Josh Flaherty
Re: Cisco FWSM and Random Sequencing Ian McDonald
Re: Cisco FWSM and Random Sequencing Peter Setlak
making intranet content available to outside sources Ashfield, Matt (NBCC)
REN-ISAC and SANS NCSAM Webcast October 28 Beth Young

Monday, 21 October

Re: Cisco FWSM and Random Sequencing Chris Green

Tuesday, 22 October

NCSAM 2013 Mid-Month Update Valerie Vogel
end point and credit protection Alex Jalso

Wednesday, 23 October

reporting structure Russ Leathe
Re: reporting structure Knights, John
Re: reporting structure Chris Vakhordjian
Re: reporting structure Jenny Blaine
Re: reporting structure George Farah
Re: reporting structure Valerie Vogel

Thursday, 24 October

Re: Reporting Structure John Forker
Re: reporting structure Valdis Kletnieks
Re: Reporting Structure Watkins, Lewis
Cloud Computing Survey Babayemi Omole
Re: Cloud Computing Survey Roger A Safian

Friday, 25 October

Cloud Computing Survey Babayemi Omole
Duo admin API Roger A Safian

Tuesday, 29 October

Certified? Russ Leathe

Wednesday, 30 October

Idle timer for password protected screensaver & forced logoff Joseph Lee

Thursday, 31 October

Invitation to Submit a Proposal for the EDUCAUSE Security Professionals Conference 2014 Valerie Vogel
NCSAM 2013 is Wrapping Up—What's Next? Jodi Ito

Friday, 01 November

Excellent Java Developer Needed NICHOLAS S ROY
Job Posting: IT Security Architect - University of Iowa Drews, Jane E
Checkpoint Vs. Palo Alto Vs. Fortinet Allan Nelson
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Nathaniel Hall

Monday, 04 November

Re: Checkpoint Vs. Palo Alto Vs. Fortinet Roger A Safian
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Kevin Robert Hayes
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Bradley, Stephen
FISMA Bohlk, Christopher J.
New CISO position at Princeton University Nadine L. Stern
Anyone using Sumuri Paladin as a part of their security strategy for investigations? James H. Moore

Tuesday, 05 November

File sharing settings with cloud collaboration tools Dan Han

Wednesday, 06 November

Re: File sharing settings with cloud collaboration tools Shamblin, Quinn
Trying to promote security knowledge not a commercial entity - Elsevier $1 eBook sale James H. Moore
FYI - Adobe account compromise Andrew Daviel

Thursday, 07 November

FireEye? Omen Wild
Re: FireEye? Keller, Alex
a question about having College ID number as part of directory information Roy Galang
Re: a question about having College ID number as part of directory information pmorley () mcdaniel edu
Re: a question about having College ID number as part of directory information Roger A Safian
Re: a question about having College ID number as part of directory information Roy Galang
Re: FYI - Adobe account compromise Brian Helman
Re: Checkpoint Vs. Palo Alto Vs. Fortinet Brian Helman
Re: a question about having College ID number as part of directory information Roger A Safian
Reminder: Deadline to Submit Valerie Vogel
Re: a question about having College ID number as part of directory information Chris Green
Re: FYI - Adobe account compromise Keller, Alex
Re: a question about having College ID number as part of directory information K
Re: FYI - Adobe account compromise Louis Aponte
Federal laws applicable to Universities Francisco Pérez
Re: Reminder: Deadline to Submit Joel L. Rosenblatt
Re: Federal laws applicable to Universities Michael Cole
Re: Federal laws applicable to Universities Carr, Michael G
Re: Federal laws applicable to Universities Tracy Beth Mitrano
Re: Federal laws applicable to Universities Francisco Pérez
Re: Federal laws applicable to Universities Valerie Vogel
Re: Federal laws applicable to Universities Feehan, Patrick
Re: Federal laws applicable to Universities Khan, Sam
Re: Federal laws applicable to Universities Carlos Lobato
Re: Federal laws applicable to Universities Long, H Morrow
Re: Federal laws applicable to Universities Shaw, David J

Friday, 08 November

Re: Federal laws applicable to Universities Dan Han
Re: SECURITY Digest - Federal Laws and IT Rosenthal, Jane E.

Monday, 11 November

Re: FYI - Adobe account compromise Brian Helman
URL Logging Allowed? Gramke, Jim
Re: URL Logging Allowed? Harry Hoffman
Re: URL Logging Allowed? Rich Graves
Security Analyst Positions - Medical University of South Carolina (Charleston, SC) Richard H Gadsden
Re: FYI - Adobe account compromise Gary Warner
Re: FYI - Adobe account compromise Brian Helman

Tuesday, 12 November

Re: FYI - Adobe account compromise Gary Warner
job posting: REN-ISAC Principal Security Engineer Doug Pearson
SRP - GoToMeeting Jason Rinne
Re: SRP - GoToMeeting McCrone, Kevin
REN-ISAC ALERT: Threat to institutional computer accounts by the Adobe breach Doug Pearson
Small cheap custom phishing Steve Bohrer

Wednesday, 13 November

Re: Small cheap custom phishing Pete Hickey
Re: Small cheap custom phishing Steve Bohrer
Re: Small cheap custom phishing Albert Lunde
Security 2014 CFP Deadline: Thursday, Nov. 14 Valerie Vogel
Do you use video conferencing for identity proofing remote students? Moore, Beverly Y
Re: Do you use video conferencing for identity proofing remote students? Roger A Safian
Re: Do you use video conferencing for identity proofing remote students? McClenon, Brady
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson
Re: Do you use video conferencing for identity proofing remote students? Mally Mclane
Re: Do you use video conferencing for identity proofing remote students? Flynn, Gary - flynngn
Free ACE Webinar on Cybersecurity: November 18 Valerie Vogel
Re: Do you use video conferencing for identity proofing remote students? Julian Y Koh
Re: Do you use video conferencing for identity proofing remote students? Palmer, Kevin J.

Thursday, 14 November

Re: Do you use video conferencing for identity proofing remote students? Charles Buchholtz
Re: Do you use video conferencing for identity proofing remote students? randy
Re: Do you use video conferencing for identity proofing remote students? Jones, Mark B
Re: Do you use video conferencing for identity proofing remote students? Dan Peterson
Ransomware Shahra Meshkaty
Re: Ransomware Kevin Moll
Re: Ransomware Shamblin, Quinn
Re: Ransomware Roger A Safian
Re: Ransomware Weston, Brett
Re: Ransomware Paul Chauvet
Vet school account compromises Jason Todd

Friday, 15 November

Information Security ECAR Research Bulletin Publicly Available Valerie Vogel
REN-ISAC/SANS Aggregate purchase program webcast Beth Young

Tuesday, 19 November

Re: US Department of Justice Victim Notification System Semmens, Theresa
Active Directory DC and ADFS in the cloud? Kevin Halgren
Seen this? Gene Spafford
Re: US Department of Justice Victim Notification System Jacobson, Dick

Wednesday, 20 November

Encryption William Quan
Re: Encryption Shamblin, Quinn
Re: Encryption Chris Green
Re: Encryption Mally Mclane
Re: Encryption Chris Green
Re: Encryption SCHALIP, MICHAEL

Thursday, 21 November

Re: Encryption Dan Han
Re: Encryption James J Furstenberg
Re: Encryption William Quan
Re: Encryption Self, Dennis

Friday, 22 November

WildCard Certificates Gramke, Jim
Re: WildCard Certificates Gramke, Jim
Re: WildCard Certificates Dexter Caldwell
Re: WildCard Certificates Dexter Caldwell
Digication and google OpenID Eric Weakland
Start Planning Now for Data Privacy Month 2014 (January 28-February 28) Valerie Vogel
Job posting - VCU Senior Info Sec Analyst Dan Han

Saturday, 23 November

Biometric Survey for Higher Education Mclaughlin, Kevin (mclaugkl)

Tuesday, 26 November

Job Posting - Univ of KY (UK) Network Security Analyst Carr, Michael G
Job Opening - IT Security Engineer at UIUC Joe Barnes

Monday, 02 December

Blocking phishing URL's Ullman, Catherine
Re: Blocking phishing URL's Stein, Nico Alexander
Re: Blocking phishing URL's Kevin Moll
Re: Blocking phishing URL's Josh Flaherty
Re: Blocking phishing URL's Julian Y Koh
Re: Blocking phishing URL's Mally Mclane
Re: Blocking phishing URL's Bob Bayn
Re: Blocking phishing URL's Maloney, Michael
Re: Blocking phishing URL's Eric Schewe
Re: Blocking phishing URL's Ullman, Catherine

Tuesday, 03 December

help Dan Peterson

Wednesday, 04 December

Re: Blocking phishing URL's Thomas Munson
Re: Blocking phishing URL's Michael Benedetto
Re: Blocking phishing URL's Stein, Nico Alexander
Job Opening -- IT Application Security Engineer at UC Irvine Josh Drummond

Friday, 06 December

HEISC survey on Windows XP EOL plans Mike Osterman
inital passwords for students Yost, Davis
Re: inital passwords for students Joel L. Rosenblatt
Re: inital passwords for students David Curry
Re: inital passwords for students Stevens, Eric J.
Re: inital passwords for students Yost, Davis
Re: inital passwords for students Nick Giacobe
Re: inital passwords for students Hugh Burley
Re: inital passwords for students Dan Schwartz
Re: inital passwords for students Jones, Mark B
Re: inital passwords for students David Curry
Re: inital passwords for students Barron Hulver
Re: inital passwords for students David Curry
Re: inital passwords for students McLaughlin, Bryan S.
Image, word, and password login Derek Diget
Re: Image, word, and password login Joel L. Rosenblatt
Re: Image, word, and password login Karl Bernard
SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ben Marsden
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert

Saturday, 07 December

Re: SQRL (Re: [SECURITY] Image, word, and password login) Mclaughlin, Kevin (mclaugkl)
Re: SQRL (Re: [SECURITY] Image, word, and password login) Ryan Hiebert

Monday, 09 December

Google "Unusual traffic from your computer network" notification Michael J. Kenney
Re: SQRL (Re: [SECURITY] Image, word, and password login) Clouse, Michael J
Remote access to SIS/ERP? David Curry
Re: Google "Unusual traffic from your computer network" notification Randall C Grimshaw
CampusGuard is seeking a Security Advisor Henninger, Craig
Re: Google "Unusual traffic from your computer network" notification Jon Robinson

Tuesday, 10 December

TOR and the Digital Freedom Conversation Jeffrey Sabin
Re: inital passwords for students Don Faulkner

Wednesday, 11 December

Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Tim Doty
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Isabelle Grey
Re: TOR and the Digital Freedom Conversation Shalla, Kevin
Re: TOR and the Digital Freedom Conversation Tracy Beth Mitrano
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Shalla, Kevin
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Tim Doty
Re: TOR and the Digital Freedom Conversation Tim Doty
Re: TOR and the Digital Freedom Conversation Joel L. Rosenblatt
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation David Escalante
Re: TOR and the Digital Freedom Conversation Manjak, Martin
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Williams, Charles
Re: TOR and the Digital Freedom Conversation Jones, Mark B
Re: TOR and the Digital Freedom Conversation Manjak, Martin

Thursday, 12 December

Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Joseph N Kurtin
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Ryan Skelton
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar Alexander W. Miranda
Re: Job Opening - Network Engineer/Computing Security Analyst - Northwestern University in Qatar John K Lerchey
Sharing a Holiday Security Awareness Video Havens, Lori

Monday, 16 December

Re: Biometric Survey for Higher Education Valerie Vogel
Re: Remote access to SIS/ERP? Theresa Rowe
Re: Remote access to SIS/ERP? Miller,James R
Re: Remote access to SIS/ERP? Miller,James R
Re: Remote access to SIS/ERP? Hanson, Mike

Tuesday, 17 December

PCI-DSS 3.0 Russ Leathe
Re: SECURITY Digest - 12 Dec 2013 to 16 Dec 2013 (#2013-219) Kim Cary

Friday, 20 December

uptick in http scanning? Brian Helman
SANS VLE and Canvas Nick Recchia
Re: SANS STH and Canvas Nick Recchia
Re: SANS STH and Canvas Miguel A. Glez. de la Torre
Previous period Next period
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault