FEATURES |
Top 10 Security Risk Factors for Public and Academic Libraries
By Steve Albrecht
|
Page 4 |
How Our Institution Went From Most Hacked to Zero Breaches
By Juan Denzer
|
Page 8 |
Remote Access Security: Proxy by Hostname to the Rescue!
By Robert Bruno |
Page 20 |
Artificial Intelligence and Malicious Steganography
By Felicia A. Smith
|
Page 24 |
DEPARTMENTS |
Editor’s Notes
Better Safe Than Sorry
By Dick Kaser |
Page 2 |
News Desk
By Celeste Peterson-Sloss |
Page 27 |
Books to Check Out
By Celeste Peterson-Sloss |
Page 28 |
Noted & Quoted
By Celeste Peterson-Sloss |
Page 32 |
COLUMNS |
Practical Technology
What Do They Know, and When Did They Know It?
By jessamyn west |
Page 12 |
Building Digital Libraries
Cyberthreats and the Rules of Engagement
By Terence K. Huwe |
Page 14 |
The Systems Librarian
How Cloud Services Strengthen Library Security
By Marshall Breeding |
Page 17 |
SPECIAL SECTIONS |
Write for CIL |
Page 19 |
EDTECH
Personas and Jobs to Be Done
By Deirdre Costello |
Page 32 |