iTnews

Educause and CIS in joint offering to colleges

By Staff Writers on Jan 10, 2005 5:00PM

Nonprofit association Educause, which promotes IT use in higher education, and the Center for Internet Security (CIS) have teamed up to provide more tools to colleges and universities in order to improve cybersecurity.

CIS develops benchmarks for technical security controls that strengthen the configuration of operating systems, software applications, and network devices. Under the agreement, each Educause institutional member can, at no cost, redistribute CIS benchmarks and software tools on college and university-owned systems.

Access to the benchmarks will give colleges and universities a straightforward way to measure system security.

In addition, the relationship entitles institutional members to redistribute CIS tools to students, faculty, and employees for use on computers they own. CIS memberships usually costs between $2,000 to $7,000.

Rodney Petersen, policy analyst and security task force coordinator at Educause, praised the efforts of CIS to improve the security of "out-of-the-box" systems, which he said was very consistent with the goals of Educause's Security Task Force.

The partnership provides technical control baselines that can be presented to software vendors and hardware suppliers as default security configurations for systems that colleges and universities purchase.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
andciscollegeseducauseinjointofferingsecurityto

Partner Content

Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform
Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits
Vast majority of surveyed firms still rely on password authentication
Promoted Content Vast majority of surveyed firms still rely on password authentication

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Staff Writers
Jan 10 2005
5:00PM
0 Comments

Related Articles

  • China spied on Russian defence research institutes
  • 'White hat' hackers no longer risk prosecution by the US
  • Careful you don't unwittingly hire North Korean IT freelancers
  • Australia's ID systems 'deficient', unfit for online: review
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.