Skip to main content

Become an Insider

Sign up today to receive premium content!

Sign Up
Home Home MENU
Log in

Mobile menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search

Main menu

  • Topics
  • States
  • Tips & Tactics
  • Voices
  • Features
  • Video
  • UniversITy
  • More
    • Reviews
    • News
    • Events
    • Remote Learning
    • Esports
    • White Papers
    • Must Read IT Blog
    • UniversITy
    • About Insider
    • Digital Equity
  • Search
  • Energy & Utilities
  • Enterprise
  • Financial Services
  • Legal
  • Manufacturing
  • Nonprofit
  • Retail
  • Small Business
  • Sports & Entertainment
  • Startups

Trending Now

  • Classroom
  • Cloud
  • Data Analytics
  • Data Center
  • Digital Workspace
  • Hardware
  • Internet
  • Management
  • Networking
  • Security
  • Software

Trending Now

students on laptops

Security

Security, Privacy and Confidentiality: What’s the Difference?

Network connectivity

Networking

How the University of Michigan Executed a Network Connectivity Upgrade

Ed Hudson, CISO at California State University

Security

Universities Share Lessons Learned from Ransomware Attacks

Higher Ed influencer list 2021
The 2021 Dean’s List: 30 Higher Ed IT Influencers Worth a Follow
Jun 15 2021

Here are the savviest higher education IT leaders, bloggers, podcasters and social media personalities you should follow.

Cover of the Summer 2022 issue of EdTech/Higher Education magazine

EdTech Magazine

Current Issue | Archive
  • twitter
  • feed

Articles By Chris Hayhurst

About the Author:

Chris Hayhurst is a freelance writer who covers education technology and healthcare, among other topics. He's a regular contributor to the CDW family of technology magazines

Follow On:
Ed Hudson, CISO at California State University

Security

Universities Share Lessons Learned from Ransomware Attacks

Universities that faced security breaches share advice from their experiences.

Jennifer Triplett

Management

How Higher Ed Institutions Manage Long-Term Digital Transformation Projects
Michael Corn

Security

Colleges Leverage Pandemic’s Hard Lessons to Advance Cybersecurity Strategy
ET-Cloud Ready

Cloud

What It Takes to Secure the Cloud
 John Rathje, CIO and Vice President for IT,  Kent State University

Networking

Building Higher Ed Networks That Are Ready for Anything
As Classroom Technology Support Administrator, Brian Leas and his team at Missouri State University’s Faculty Center for Teaching and Learning are spearheading a project to install Zoom Rooms across campus.

Hardware

With Hybrid Learning on the Rise, Higher Ed Sees a Zoom Room Boom
Which CARES Act-Funded Technologies Best Support Underserved Remote Learners?

Classroom

Which CARES Act-Funded Technologies Best Support Underserved Remote Learners?
Successful Examples of Higher Ed Outdoor Learning Spaces

Networking

Successful Examples of Higher Ed Outdoor Learning Spaces
Netwalker: Remote learning and work have raised the stakes when it comes to protecting college and university networks.

Security

Securing Higher Ed's Growing Number of Remote Devices
Moving forward in higher education

Classroom

Looking Back, Moving Forward: Preparing for the Unknown
How Data Analytics Is Helping Universities Restart Sports

Data Analytics

How Data Analytics Is Helping Universities Restart Sports
  • Load More Stories

aaa 1

Register

Advertisement

Trending Now

students on laptops

Security, Privacy and Confidentiality: What’s the Difference?

Network connectivity

How the University of Michigan Executed a Network Connectivity Upgrade

Ed Hudson, CISO at California State University

Security

Universities Share Lessons Learned from Ransomware Attacks

Universities that faced security breaches share advice from their experiences.

Adult learners in higher ed

How Technology Investments Can Better Engage Adult Learners

Subtopics

A group of professionals discuss something around some computers

Security

How to Develop a Threat Intelligence Program in Higher Education

EdTech

Technology Solutions That Drive Education

  • About Us
  • Contact Us
  • Privacy
  • Terms & Conditions
  • Site Map
  • EdTech:

  • CDW:

Visit Some Of Our Other Technology Websites:

  • BizTech
  • FedTech
  • StateTech
  • HealthTech

Tap into practical IT advice from CDW experts.

Visit the Research Hub

Get EdTech in your Inbox Browse Email Archives
newsletter screenshot
Subscribe to EdTech Magazine Browse Magazine Archives
Cover of the Summer 2022 issue of EdTech/Higher Education magazine
Back To Top

Copyright © 2022 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061