Skip to main content
University of Wisconsin–Madison
UW Crest
UW–⁠Madison Information Technology
Connecting & supporting our digital campus
  • Services
  • Learn
  • Community & governance Expand Collapse
    • Communities, committees, groups
    • IT Governance
  • IT projects & priorities Expand Collapse
    • IT project portfolio
    • IT Strategic Priorities 2022-2025
  • Cybersecurity Expand Collapse
    • Office of Cybersecurity
    • Data privacy week
  • Academic Technology
  • Accessibility Expand Collapse
    • Digital accessibility @ UW–‍Madison
    • Make It Accessible
    • Liaison Network
  • AI Expand Collapse
    • Generative AI services
    • Generative AI use & policies
    • CISO statement on use of generative AI
    • Microsoft 365 Copilot Chat
  • IT@UW–‍Madison Expand Collapse
    • About IT@UW–‍Madison
    • Division of Information Technology (DoIT)
    • Distributed IT
    • DoIT History
  • Accounts Expand Collapse
    • Email
    • MyUW
    • Learn@UW
    • Box
    • Google Apps
    • More Services
  • Zoom
  • Get help
  • Outages
  • Scam alerts
  1. Home
  2. IT News

IT News

The Pentateuch (well, sort of)…

Posted on October 12, 2018

As far back as the Confirmation classes I took when I was in middle school (which I remember being called Junior High School), I’ve always thought of the first five books of the Bible as setting the baseline for how people should act. Our pastors and teachers called these books The Pentateuch…

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

Moving beyond FUD, Part II

Posted on July 19, 2018

As a general rule, fear, uncertainty and doubt (known as FUD in cybersecurity circles) are discouraged as an effective method of influencing audiences. Is there ever a situation where FUD is useful? Sam Curry is …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

Moving beyond FUD, Part I

Posted on July 19, 2018

The CISO’s Perspective  2018 – June At the University of Wisconsin-Madison, we know the higher education and research communities are, in practice and by necessity, an open and collaborative society driven by the need to …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

What Copernicus knew about cybersecurity operations

Posted on June 27, 2017

The CISO’s Perspective / 2017 4th Edition Prior to the Renaissance, many mathematicians, theologians and philosophers believed the Earth was the center of a finite universe and that the sun, planets and stars orbited around …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

Google Docs, ransomware and other adventures

Posted on May 15, 2017

The CISO’s Perspective / Special Edition Over the last several weeks the UW-Madison Cybersecurity Operations Center has observed two significant events along with several minor to important episodes which should cause all of us to …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News, Productivity & Collaborative Solutions News

Enterprise Systems Security

Posted on April 11, 2017

The CISO’s Perspective / Special Edition Every once in a while I like to point out one of the teams in the Office of Cybersecurity and present something newsworthy. Today I want to highlight the …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

Now that we know what cybersecurity risk is…

Posted on March 14, 2017

The CISO’s Perspective “It’s not important because it’s policy, its policy because it’s important.” — Gary Declute After working on it for about a year, we are in the end stages of walking the Cybersecurity Risk …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

Smart cybersecurity plans balance vision and agility

Posted on December 22, 2016

The CISO’s Perspective There’s an inherent dilemma in effectively managing cybersecurity: IT organizations must dedicate the time and focus required for long-term strategic planning while maintaining the agility to meet evolving threats and take advantage …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News

The CISO’s Perspective – Beyond security and privacy: the ethical use of data

Posted on October 25, 2016

This is a re-run of an article I wrote for Security Current which was based on a presentation I delivered at the IQPC Cybersecurity in Higher Education Conference in March of this year. As the …

Posted in CIO Blog, CISO’s Perspective – Cybersecurity Blog, Cybersecurity News, IT News
  • Previous page
  • 1
  • 88
  • 89
  • You're on page 90

Site footer content

University logo that links to main university website Part of the Universities of Wisconsin

IT @ UW-Madison

  • Services
  • Learn
  • Community & governance
  • IT project portfolio
  • IT Strategic Priorities 2022-2025
  • Cybersecurity
  • Digital accessibility
  • AI @ UW–‍Madison: use & policies

Quick Links

  • Get started with tech
  • Outages
  • Campus IT jobs
  • IT help & support (DoIT Help Desk)
  • Website edits or feedback (it.wisc.edu)
  • Accessibility@UW–‍Madison

Contact Us

  • 1210 W Dayton St
    Madison, WI 53706
    • youtube
    • linkedin

Need tech support? Visit DoIT Help Desk to get help with campus apps, logins, devices, or other IT issues.

Website feedback, questions or accessibility issues: webchanges@doit.wisc.edu | Learn more about accessibility at UW–Madison.

This site was built using the UW Theme | Privacy Notice | © 2025 Board of Regents of the University of Wisconsin System.