article thumbnail

Case study: The Hub by SAS

ChiefTech

SAS launched The Hub, based on Socialcast , in 2011. In a case study they explain that SAS had a number of requirements, including: "All communications would have to be maintained behind the firewall (for security reasons) while seamlessly integrating with other internal business systems such as SharePoint.".

article thumbnail

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

This week, Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data. Mitsubishi Electric disclosed the security incident only after two local newspapers, the Asahi Shimbun and Nikkei , reported the security breach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK ICO Releases Code on Data Sharing

Hunton Privacy

On May 11, 2011, the UK Information Commissioner’s Office (the “ICO”) published a new statutory code of practice on the sharing of personal data. The published code of practice includes the addition of case studies which provide practical explanations of how the Data Protection Act applies to data sharing.

Paper 40
article thumbnail

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

I've been interested in the role and trusted context features of Db2 for z/OS for a long time (I posted a two-part blog entry on the topic back in 2011). These Db2 features work together to shut down the potential security exposure just described. Theory is nice, but what about practice? Enter roles and trusted contexts.

article thumbnail

Top MDR Services for 2021

eSecurity Planet

These services are managed by outsourced teams of experts to help remove some of the need for dedicated onsite security staff and to decrease the amount of day-to-day work for their clients. The company currently secures $5.7 Every client receives a dedicated security advisor to streamline questions and support. Secureworks.

Cloud 57
article thumbnail

Ireland: New DPC Guidance Sets Regulatory Expectations around Use of Website Cookies

DLA Piper Privacy Matters

So while it is prudent to be aware of potential new laws, organisations should ensure they are first compliant with the existing law on cookies, which in Ireland is the 2011 ePrivacy Regulations. Record consents in a way which you can demonstrate the user’s ability to withdraw. Cookie Policy.

GDPR 59
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. One of the earliest intranet case studies was actually written by Jakob Nielsen and Darrel Sano in 1994 about their approach to designing Sun Microsystems' intranet - and yes, one of the methods was card sorting !

Cloud 89