Unbelievably, 2014 marks the completion of our sixth year of publishing Case-in-Point: lessons for the pro-active manager. Looking back at the origins of this publication, our idea was (and is) very simple: we thought it would be a good idea to send leaders at our institution an overview of monthly events in higher education with the hope that if we had similar issues or risks here, we could address them before a problem happened. Cynics would say that the idea is naive but for some reason it seems to have worked at least in some small ways and on a few specific occasions.
The January 2009 issue went to about 70 people all at Auburn University (AU). Today's mailing will go to over 1,100 people at institutions all over the USA and a couple of institutions outside the USA. While we never intended for this to be anything other than an institutional publication, we are happy that many outside of AU have found Case-in-Point helpful in some way.
To help the seventh year of publication be even better, we ask for your assistance in helping identify stories that you believe would be good for inclusion each month. If you come across an item that you think would fit well within Case-in-Point, please email us at firstname.lastname@example.org.
The ultimate goal each month of this publication is to help leaders be pro-active in managing the risks we face within higher education. Next month we will begin our annual look back at what occurred in 2014 and consider possible trends that may be emerging. Until then, we invite you to review this month's events and consider how you can use your influence to help reduce and pro-actively manage risks.
|InfoWorld's 2015 Technology of the Year Award winners||01/26/2015 |
|Adobe pushes critical Flash Player update to fix latest zero-day||01/26/2015 |
|Adobe fixes just one of two actively exploited zero-day vulnerabilities in Flash Player||01/22/2015 |
|Users get more control over data in latest Firefox browser beta||01/22/2015 |
|CheckPoint, Watchguard earn top spots in UTM shoot-out||01/07/2015 |
|Review: The best password managers for PCs, Macs, and mobile devices||06/18/2014 |
|Review: 4 VM security tools go under the microscope||03/13/2014 |
Last Updated: December 19, 2014