Content (75)
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.
Starting Wednesday, October 15, 2025, at the direction of IT leadership, Cornell will begin moving forward at an accelerated pace toward the goal of enforcing DMARC ("Domain-based Message Authentication, Reporting, and Conformance") policies.
A Message from Robert Edamala, Chief Information Security OfficerGreetings,It’s that time of year! October is National Cybersecurity Awareness Month (NCSAM), an annual campaign to share helpful resources everyone needs to stay safe and secure online.In today’s digital world, cybersecurity isn’t…
As part of the CIT Managed Servers service, the IT Security Office administers the Rapid7 InsightVM vulnerability management tool. All Managed Servers are automatically enrolled in InsightVM and customers can access scan results via the InsightVM console.
IT staff can access a web-based application vulnerability scanning utility, AppSpider, that is easy-to-use, feature-rich, and up to date with the latest vulnerability scanning signatures.
NetAdmins can access an easy-to-use, web-based, feature-rich, and up-to-date general-purpose vulnerability scanner.Get started with Tenable Vulnerability Management.If you need assistance reclassifying a vulnerability severity or acceptance of a risk finding, please submit a request form.
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting. This month's meeting is a special in-person gathering.August Agenda:Ice Cream SocialWednesday, August 13, 2025, …
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.July Agenda:News from the Front! - BillWhat's new from IDM - Muhammad ArifState of AI at Cornell - Ayham BoucherThe IT…
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.June Agenda:News from the Front! - BillOpen ForumThe IT Security SIG meets via Zoom on the second Wednesday of each…
College students are being targeted in a new scam that lures them in with the promise of tickets to sports or concert events and leaves them empty-handed. The university’s Division of Public Safety has urged everyone to be cautious and protect themselves from identity theft and fraud.
Email messages, like art, can be forged and the use of generative artificial intelligence (AI) makes it easier for bad actors to produce fakes that appear more professional and personalized.
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.March Agenda:News from the Front! - BillWhat's new at IDM - Moe ArifWISP Update - Meryl Bursic, and Tim Bradish …
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.February's Agenda includes:
For over a decade, Tim Bradish has helped shield and strengthen Cornell services and systems against attack. In a spotlight story on the Human Resources (HR) home page, the associate chief information security officer attributed his team’s success to their interest in working with each other and…
AI meeting assistants or “bots” can be used for monitoring, summarizing, and recording virtual meetings. They are powerful tools for the purposes of accessibility and convenience but should also be used with caution. Whenever AI is involved, you should know how its use could impact your privacy and…