Blog

All tagged "Security, access and identity management"

Edtech 2K19, what’s in store?

Was there a robot or a drone under your Christmas tree this year, or perhaps a smart lightbulb or a connected toothbrush? As tech companies put microchips into everyday objects and connect them to the internet, it feels like our lives are becoming a little more sci-fi every day. >>

Virtual reality education illustration
Creative Commons attribution information
©exdez via iStock
All rights reserved
Martin Hamilton

The General Data Protection Regulation and what it means for cyber security

Keeping personal data secure has been a legal requirement since the 1984 Data Protection Act. But that creates a paradox, because to secure the computers and networks that store and carry personal data, we need to collect additional personal data about how those systems are used and abused >>

Students working at North Lindsey College
Creative Commons attribution information
Students working at North Lindsey College
©Jisc and Matt Lincoln
Andrew Cormack

Managing information security in a digital era

The paperless office has been an aspiration for some time. However, for many in the world of education and training, they are now moving towards the next era, looking at a born digital approach with the potential for increased efficiencies, improvements in quality, auditability and transparency, as well as financial savings. >>

Logged in at Jisc Digital Festival
Creative Commons attribution information
Logged in at Jisc Digital Festival
©Jisc and Matt Lincoln
Nicole Convery