Digital Identity ...
Follow
Find
8.5K views | +0 today
 
Rescooped by Frank J. Klein from Technology's Use in Today's Classroom: EDU 204
onto Digital Identity and Access Management
Scoop.it!

Why We Need Digital Wisdom

Why We Need Digital Wisdom | Digital Identity and Access Management | Scoop.it

Fewer and fewer jobs can be done without technology. Our increasingly sophisticated technologies enable our enhanced minds to do many previously impossible things, such as mass individualization, and quickly connecting and combining ideas from humans around the world.


Via Nik Peachey, Lauren Furgason
more...
Rosemary Tyrrell's curator insight, September 5, 2013 1:10 PM
Nik Peachey's insight:

Nice article by Marc Prensky. Love this quote "For today’s young people, using technology is as fundamental as reading was for their parents and grandparents. It underlies and supports everything they do."

vincent martinez's curator insight, September 6, 2013 7:35 AM

"For today’s young people, using technology is as fundamental as reading was for their parents and grandparents. It underlies and supports everything they do."

Lauren Furgason's comment, September 11, 2013 5:17 PM
once again... love this...
Digital Identity and Access Management
Digital authentication, authorization,administration and auditing of a persons identity.
Curated by Frank J. Klein
Your new post is loading...
Your new post is loading...
Rescooped by Frank J. Klein from SEO Tips, Advice, Help
Scoop.it!

2015 #SEO Salary & Job Research Study [Infographic]

2015 #SEO Salary & Job Research Study [Infographic] | Digital Identity and Access Management | Scoop.it

New research from Conductor offers interesting insight when it comes to the SEO salary landscape. This new research follows up their 2012 SEO jobs and industry careers study, which was used to compare the growth of the SEO industry from 2012 to today.


Via Bonnie Burns
more...
No comment yet.
Rescooped by Frank J. Klein from SEO Tips, Advice, Help
Scoop.it!

Google: The Mobile-Friendly Ranking Factor Runs In Real-Time & Is On A Page-By-Page Basis

Google: The Mobile-Friendly Ranking Factor Runs In Real-Time & Is On A Page-By-Page Basis | Digital Identity and Access Management | Scoop.it
Google tells us that the mobile-friendly algorithm launching in about a month is on a page-by-page basis and run in real-time which eases the concerns of many webmasters.

Via Bonnie Burns
more...
Bonnie Burns's curator insight, March 5, 12:04 PM

By real-time, I believe this means that once Google crawls the page again, it will immediately be labeled as mobile-friendly and immediately benefit from the algorithm. If your pages are slow to be indexed because they are rarely updated, then it is important to go mobile-friendly sooner.

Rescooped by Frank J. Klein from iPads in Education
Scoop.it!

Free Technology for Teachers: Great Tools for Informal Assessment

Free Technology for Teachers: Great Tools for Informal Assessment | Digital Identity and Access Management | Scoop.it
This afternoon at the NCTIES 2015 conference I gave a short, interactive presentation on tools and strategies for conducting informal assessments in your classroom. Included in the presentation were demonstrations of Plickers, Kahoot, and SeeSaw. I also shared the idea of taking advantage of recording options on cell phones to have students record short video and audio messages about their understanding of a concept. The slides from that presentation are embedded below.

Via John Evans
more...
No comment yet.
Rescooped by Frank J. Klein from SME Cyber Security
Scoop.it!

The cybercrime economy personified

The cybercrime economy personified | Digital Identity and Access Management | Scoop.it
The cybercrime economy is entrenched in digital fox holes and hoodlum hideouts the world over. It’s not going away. Your best bet is to be the hardest target on the battlefield.

Via Roger Smith
more...
Roger Smith's curator insight, March 4, 4:59 PM

The concept - make it harder than your competitor - is a good strategy for cybersecurity.    In the digital world, we are all targets, but making it harder for the cybercriminal to target you than the next person means that you have a better chance in the future

Rescooped by Frank J. Klein from Geography Education
Scoop.it!

Volcanic Eruption

"WebCams de Mexico archives the best of webcam videos in Mexico."


Via Seth Dixon
more...
Seth Dixon's curator insight, February 20, 11:02 AM

What does a volcanic eruption look like?  Just like this. 


Tags: disastersMexico, physical, volcano.

Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

7 tips for protecting your AWS cloud

7  tips for protecting your AWS cloud | Digital Identity and Access Management | Scoop.it
Code Spaces was hacked and had to shut down - what can you learn from this?

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

Technology in LED smart lights raises privacy concerns

Technology in LED smart lights raises privacy concerns | Digital Identity and Access Management | Scoop.it
A California company has found as way to turn energy-saving LED bulbs into smart networks that can collect and feed data

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

A Tough Corporate Job Asks One Question: Can You Hack It?

A Tough Corporate Job Asks One Question: Can You Hack It? | Digital Identity and Access Management | Scoop.it
To combat the growing threat of online breaches, companies and governments are hiring chief information security officers — whose main responsibility is to make sure data systems are secure.

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

Georgetown Law Launches Center on Privacy and Technology

Georgetown Law Launches Center on Privacy and Technology | Digital Identity and Access Management | Scoop.it

Georgetown University Law Center Dean William M. Treanor is pleased to announce the establishment of the new Center on Privacy and Technology. The Center will bring Georgetown Law’s legal expertise to bear on privacy debates in federal and state legislatures, regulatory agencies and the academy. It will also train Georgetown Law students to be leaders in privacy practice, policymaking and advocacy. 

 

“We are in the midst of a debate about privacy that has the most profound importance, and the ways in which it is resolved will shape the most central aspects of our lives,” Treanor said. “The new Center on Privacy and Technology will ensure that our faculty and students stay at the forefront of that debate for years to come.”


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

Security Must Evolve to Be ‘All About the Data’

Security Must Evolve to Be ‘All About the Data’ | Digital Identity and Access Management | Scoop.it

Instead of focusing on a device or a user, it would be, “only about the data – not about the device, not about the network. You need to protect it, own it, revoke it.”

 

To do that in the next five years, he said, would require three things: “First, encrypt it with enterprise key management. That’s fundamental to any BYOD strategy.

 

“Second, it has to reside in a virtual container that I control, like an embassy that is subject to my rules and my laws. Somebody else can’t repurpose it, send it out on an email or do anything with it.

 

Finally, he said, it would have to possess egress policies that control who can access it. “If I want to revoke the key, I can hit a red button and it doesn’t matter if the bytes are still there, you can’t read them,” he said, contending that if the National Security Agency had had that kind of control over its data, it could have prevented whistleblower Edward Snowden from stealing and passing on classified information to journalists.


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

National Cybersecurity Awareness Month is Coming Up Quickly!

National Cybersecurity Awareness Month is Coming Up Quickly! | Digital Identity and Access Management | Scoop.it

October is National Cyber Security Awareness Month (NCSAM) and it is coming up quickly!

 

Please let us know if your campus is planning any events or activities in October. We are creating a list of 2014 campus events and we’d like to include as many higher education institutions as possible in our NCSAM Resource Kit. Feel free to share the URL or your plans with this list, or send an e-mail directly to security-council@educause.edu.

 

The Higher Education Information Security Council (HEISC) has also compiled a number of FREE educational materials that can be adapted for use at your institution in our Cybersecurity Awareness Resource Library. Or if your institution is seeking a presenter, we have a Speakers Bureau.

 

All of the resources mentioned above can be found on our NCSAM website: http://www.educause.edu/ncsam. We look forward to hearing from you and learning about what your institution is doing to promote the 11th annual National Cyber Security Awareness Month!


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

Cybersecurity Initiative | EDUCAUSE.edu

Cybersecurity Initiative | EDUCAUSE.edu | Digital Identity and Access Management | Scoop.it

Please note that we are not currently maintaining content for this Scoop.it! page. However, you can visit the EDUCAUSE Cybersecurity Initiative website for additional higher education information security resources.


Via Higher Ed InfoSec Council
more...
Higher Ed InfoSec Council's curator insight, August 13, 2014 7:11 PM

You can also follow us on Twitter for the latest scoop on #HigherEd #InfoSec issues, articles, resources, and more. http://twitter.com/HEISCouncil

Rescooped by Frank J. Klein from Curation Revolution
Scoop.it!

Content Director by Scoop.it: Because We MUST Curate Content

Content Director by Scoop.it: Because We MUST Curate Content | Digital Identity and Access Management | Scoop.it

Content Director Should Rock Content Marketing
I'm excited that th etalented @Scoop.itteam ( @Guillaume Decugis@Ally Greer@Marc Rougierand many others) are launching a new content curation tool called Content Director. As team Curagami shared in our 7 Reasons You Must Curate Content (http://shar.es/1ohSrO over 5,000 views now) knowing what content is making you money and why is a CSF (Critical Success Factor).

Can't wait for our demo tomorrow PM. Will report back.


Via Martin (Marty) Smith
more...
Rescooped by Frank J. Klein from SEO Tips, Advice, Help
Scoop.it!

5 Pinterest Image Styles That People Love to Share |

5 Pinterest Image Styles That People Love to Share | | Digital Identity and Access Management | Scoop.it
Are you looking to improve your Pinterest engagement? This article shares the Pinterest images people love to share and why they are so popular.

Via Bonnie Burns
more...
No comment yet.
Rescooped by Frank J. Klein from iPads in Education
Scoop.it!

Powerful Primary Source Documents for iPad Readers - CassTechTips.com

Powerful Primary Source Documents for iPad Readers - CassTechTips.com | Digital Identity and Access Management | Scoop.it
Primary source documents are powerful tools for engaging students with social studies content and informational text.  These artifacts can bring history to life for students who may feel disconnected from experiences of people long ago.  The Book of Negroes is the companion app to the multi-part television series.  It is a free download with content that covers a wide range of time and experiences.  This interactive app lets users of all ages follow a timeline, read informational text, and view documents and images.

Via John Evans
more...
No comment yet.
Rescooped by Frank J. Klein from iPads in Education
Scoop.it!

50 Resources For Teaching With iPads - Te@chThought

50 Resources For Teaching With iPads - Te@chThought | Digital Identity and Access Management | Scoop.it
So we thought we’d start an ongoing collection–that is, one that is updated to reflect trends and changes–of the best resources for teaching with the iPad.

This will include resources from all of the best sources, from Apple’s own stuff to TeachThought to edutopia to MindShift to DMLCentral to Jackie Gerstein and more. We can update it, or make it a wiki to crowdsource the process, or you can add suggestions in the comments below. Based on the activity of the comments, and the sharing of the post, we’ll decide how to handle it moving forward.

Via John Evans
more...
Ramon Pavia's curator insight, October 15, 2014 3:12 AM

Another collection....

adartshaw's curator insight, October 15, 2014 7:46 AM

Lots of good articles!

Brian Romero Smith's curator insight, October 15, 2014 2:27 PM

Great resource for a 1:1 iPad classroom/school. However, this is a great model for any 1:1 setup. You truly need to consider the Teacher/Student/Parent paradigm when deciding on applications that enhance the learning environment. Where there is not workflow vision the people will perish. 

Rescooped by Frank J. Klein from SME Cyber Security
Scoop.it!

Security flaw places Mac, iOS & Android users at risk from hacking on some major websites

Security flaw places Mac, iOS & Android users at risk from hacking on some major websites | Digital Identity and Access Management | Scoop.it
Cryptographers have discovered that a security flaw dating back to the '90s is placing OS X, iOS and Android users at risk from hacking attacks when visiting some major...

Via Roger Smith
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

3 Strategies for the New Era of Enterprise Cybersecurity

3 Strategies for the New Era of Enterprise Cybersecurity | Digital Identity and Access Management | Scoop.it

The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

 

As this has occurred, we have witnessed the equivalent of a Cambrian Explosion of new Internet-connected life forms--mobile devices, tablets, sensors, actuators, home appliances, monitoring systems, content access devices, and wireless terminals. Applications running on these devices range from recreation to services critical to the functioning of our social and economic infrastructure. Put it all together, and we expect that world population of Internet-connected devices will grow from today's 10 billion to over 50 billion by the year 2020.

 

From a security point of view, these IT changes, including the expansion of Internet-connected devices, lead to a corresponding increase in attack surface. Instead of the mission of protecting a reasonably known and enclosed IT perimeter, we now must be ready to secure any connected device humans can make against any threat a hacker can innovate. Clearly, using established security practices, except on a larger scale, will not suffice.

 

Plainly said, we need to think differently about cybersecurity.


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

10 Ways To 'Fix' Cybersecurity

10 Ways To 'Fix' Cybersecurity | Digital Identity and Access Management | Scoop.it

Ten cyberexperts offer up their best ideas for stemming the threats we face when it comes to digital security.


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

The CSO of the future

The CSO of the future | Digital Identity and Access Management | Scoop.it
What skills, background and education does a security executive need if they want their career to evolve?

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

The 5 Biggest Cybersecurity Myths, Debunked | Opinion | WIRED

The 5 Biggest Cybersecurity Myths, Debunked | Opinion | WIRED | Digital Identity and Access Management | Scoop.it
While the Internet has given us the ability to run down the answer to almost any question, cybersecurity is a realm where past myth and future hype often weave together, obscuring what actually has happened and where we really are now. If we ever want to get anything effective done in securing the online world, we have to demystify it first.

Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

6 steps to win executive support for security awareness programs

6 steps to win executive support for security awareness programs | Digital Identity and Access Management | Scoop.it

Obtaining C-Level support for security awareness programs can be tough, so Ira Winkler and Samantha Manke share a handful of tips for appealing to the executives in your organization.


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

Integrating Approaches to Privacy Across the Research Lifecycle: Long-Term Longitudinal Studies

Integrating Approaches to Privacy Across the Research Lifecycle: Long-Term Longitudinal Studies | Digital Identity and Access Management | Scoop.it

On September 24-25, 2013, the Privacy Tools for Sharing Research Data project at Harvard University held a workshop titled "Integrating Approaches to Privacy across the Research Data Lifecycle." Over forty leading experts in computer science, statistics, law, policy, and social science research convened to discuss the state of the art in data privacy research. The resulting conversations centered on the emerging tools and approaches from the participants’ various disciplines and how they should be integrated in the context of real-world use cases that involve the management of confidential research data.

This workshop report, the first in a series, provides an overview of the long-term longitudinal study use case. Long-term longitudinal studies collect, at multiple points over a long period of time, highly-specific and often sensitive data describing the health, socioeconomic, or behavioral characteristics of human subjects. The value of such studies lies in part in their ability to link a set of behaviors and changes to each individual, but these factors tend to make the combination of observable characteristics associated with each subject unique and potentially identifiable.


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Higher Education & Information Security
Scoop.it!

Will Too Much Data Blind You to a Data Breach on Your Network? | Innovation Insights | Wired.com

Will Too Much Data Blind You to a Data Breach on Your Network? | Innovation Insights | Wired.com | Digital Identity and Access Management | Scoop.it

Certainly, you have a security system or two deployed in your network. These systems, such as Intrusion Prevention Systems (IPS) or next generation firewalls (NGFW), alert you of suspicious activity on a daily basis. Furthermore, you are probably compliant to whatever your industry mandates such as PCI. Well so are your peers, which begs the question of why so many organizations continue to get breached?

 

I would posit this is another case of not keeping up with the times. Let’s face it, when was the last time you evaluated your security infrastructure to determine if it could withstand the most recent threats?


Via Higher Ed InfoSec Council
more...
No comment yet.
Rescooped by Frank J. Klein from Curation Revolution
Scoop.it!

Future of Reading is Digital, But Who Will Control - Amazon Controversy [video]

Future of Reading is Digital, But Who Will Control - Amazon Controversy [video] | Digital Identity and Access Management | Scoop.it

This panel discussion at the 2014 Miami Book Fair discusses Amazon's predatory practices, what a "book" will be in the future and who will have the rights to our intellectual property.


Via Martin (Marty) Smith
more...
No comment yet.