Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 102

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

Customer Experience Management Case Studies Case study customer story Jet Privilege Loyalty and Rewards Programs OpenText Elite OpenText LiveSite OpenText TeamSite

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Capitec Bank innovates to create real-time client interaction

OpenText Information Management

Enterprise Content Management Banking Capitec Bank Captiva Case Studies Documentum Documentum xCP enterprise content management financial services xPressionHow can digital technologies help banks gain a competitive advantage in today’s highly competitive financial services sector?

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides. The post Best of TAB 2017 part 2: the top blog posts appeared first on TAB Records Management Blog | TAB OnRecord.

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

This case study reveals a typical but complex IG problem: managing the relationships among key IG players, incl uding: Outside law firms that play a central role in approving, blocking, and/or advising on key IG decisions (like information retention and preservation). Click here to access the case study in the IGI Community.

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC).

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada

Archive-It

Tragedy struck Las Vegas, Nevada on October 1, 2017, when a lone gunman opened fire onto a crowd of twenty-two thousand people attending the Route 91 Harvest Festival, injuring over five hundred people and killing fifty-eight. Archiving Spontaneous Events Case Studies

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program

Archive-It

Case Studies How ToThe following is a guest post by Andra Stump of GPO contractor Zimmerman Associates, Inc., with contributions by Dory Bower of the U.S. Government Publishing Office (GPO).

Google's Data on Login Thefts

Schneier on Security

This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in the wild. From March 2016 to March 2017, we analyzed several black markets to see how hijackers steal passwords and other sensitive data. [.].

Best of TAB 2017 part 3: the top white papers

TAB OnRecord

In a four-part series, we are bringing you the top case studies, white papers, blog posts, and guides – all chosen by your records management colleagues! The post Best of TAB 2017 part 3: the top white papers appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 106

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

In this case, why are three heads better than one? My team at NYARC has also contributed to beta testing initiatives and studies with colleagues in the computer science department at Old Dominion University, LS3, and Rhizome, in addition to Archive-It. by Karl-Rainer Blumenthal.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account.

Archive-It Partner News, November 2017

Archive-It

To join us for updates on all things Archive-It in Q3 2017, simply point your web browsers at call time to: [link]. Take the NDSA 2017 Web Archiving Survey. To explore a rich case study in collecting and parsing out this information, see the new blog post by partners at the U.S.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. This one-day course is delivered by an experienced information security practitioner, and combines formal training, practical exercises and relevant case studies.

Acoustical Attacks against Hard Drives

Schneier on Security

Despite the widespread use of HDDs and their critical role in real-world systems, there exist only a few research studies on the security of HDDs. In particular, prior research studies have discussed how HDDs can potentially leak critical private information through acoustic or electromagnetic emanations. We show the feasibility of the proposed attack in two real-world case studies, namely, personal computers and CCTVs.

Attacking encrypted USB keys the hard(ware) way

Elie

We will demonstrate how this methodology works in practice via a set of case-studies. Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data.

Interactive: What Does It Really Mean?

The Texas Record

In these cases, people use interactive as a buzzword. In this case, I’m using “something involving meaningful action or input from a learner” as the definition. Reading a case study and using it to come to conclusions.

IT 83

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners

Archive-It

Wildfires 2017 to which several universities contributed seeds, and UVic’s B.C. Case Studies Collaborative Collectingby Caron Rollins, Matt Huculak, and Dana McFarland.

Honda Is Using IBM Watson to Drive Real Changes in Quality Assurance

Information Management Resources

This IDC Case Study examines how Honda implemented a cognitive system using text analytics to help it respond faster to customer feedback. Customer-centricity Customer data

4 ways ISO 27001 can enhance your business

IT Governance

You’ll learn how to implement ISO 27001 in nine steps and have the opportunity to get involved in group discussions, practical exercises and case studies.

Sales 58

New Functional Schedule for North Carolina State Agencies

The Schedule

For a more in-depth look at the process behind this project, check out the case study published by SAA’s Government Records Section.

IGI and TGCI’s “The Exchange” Presents The Information Governance Forum 2017

IGI

Case Studies in IG. November 1 st , 2017-The Buckhead Club. Atlanta, GA. Colloquium Lead Moderators: Barclay T. Blair. Information Governance Initiative. Jason R. Baron. Drinker Biddle & Reath LLP. The Exchange” Information Governance Forum – Atlanta, is the first program developed and delivered through the new TGCI partnership with IGI.

GDPR 20

Who will win the driverless / autonomous car wars?

Information Matters

Historical case studies ( eg. I’ve been planning some new classes for the fast-approaching semester and have decided to use the example of driverless vehicles to help my students think about what determines which type of companies win when a new technology emerges.

Kofax Announces “First Year Free” Offer for its Market Leading Information Capture Solutions

Document Imaging Report

Irvine, CA, November 30, 2017 – Kofax® , a leading provider of software to simplify and transform the First Mile™ of business, today announced a “First Year Free” offer that allows organizations to try and buy its market leading Kofax Capture™ and Kofax Transformation™ software on a no charge basis.

Collecting for continuity and for change: The web archiving experience in Westborough

Archive-It

In 2017, our library applied for and received a grant to participate in the Community Webs program, designed to teach public libraries how to use web archiving tools and enable them to curate local history collections. Case Studies Community Webs

Saving Local News on the Web

Archive-It

Gothamist and DNAInfo as they appeared on November 2, 2017. Case Studies Community WebsThe following is a guest post by Diana Bowers-Smith, Archivist, Brooklyn Collection, at the Brooklyn Public Library.

The Power of the Record

Brandeis Records Manager

Each year, we have excellent conferences–ARMA, AIIM, MER–I’ve attended them all multiple times, and they can be counted on for great sessions, engaging vendor floors, insights, leading edge case studies, keynote inspiration, and collegiality. George Despres, CRM. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.).

How Exactly are Fraudsters Ripping Off Your ATMs?

Rippleshot

In a recent webinar hosted by the ABA and Rippleshot's Chief Data Scientist Randal Cox, we discussed case studies of actual fraudster behavior and explored patterns of ATM misuse that help financial institutions fully understand the scope of this problem — and why it’s getting worse. Solving ATM fraud has become a 2 billion-dollar question. The impact of ATM skimming on a global scale).

IT 40

To Bucket or Not to Bucket…?

The Texas Record

Once it’s completed successfully, you’ll have an outstanding case study that you can share with other divisions within your agency. There is a term in records management circles you might have heard of called “big buckets.” ” Have you ever stopped and thought, “What is this? Should I be doing this? Am I missing out on something?” ” (Coincidentally, there’s the pop culture acronym F.O.M.O.

Optimizing healthcare value with prescriptive analytics – Part 2

CGI

I invite you to read our case study to learn more about our project methods and results. Optimizing healthcare value with prescriptive analytics – Part 2. shobana.lv@cgi.com. Mon, 02/20/2017 - 08:00. Moving from “what if” to “what’s best”.

Webinar: Simple Ways to Turn Your Records Liaisons Into Records Ambassadors

The Texas Record

This case study shows how the launch, and eventual revamping, of this program has impacted records management across Denton County. Date: Wednesday, October 18, 2017. In July, some staff were fortunate enough to attend the annual NAGARA Conference in Boise, ID. One of the sessions we attended was a presentation by Holly Dolan, Assistant Manager of Records Management for Denton County.

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

The framework was first mentioned in the CIA Vault 7 dump that was leaked in 2017. My colleagues at Cybaze-Yoroi ZLAB malware demonstrated how to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware.

Hunting down Gooligan — retrospective analysis

Elie

This talk provides a retrospective on how during 2017 Check Point and Google jointly hunted down Gooligan – one of the largest Android botnets at the time. Beside its scale what makes Gooligan a worthwhile case-study is its heavy reliance on stolen oauth tokens to attack Google Play’s API, an approach previously unheard of in malware.

IT 49

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

“In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.” Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric.

Crooks offer millions to skilled black hats to help them in extortion campaigns

Security Affairs

Cybercrime gangs aim at hiring skilled hackers that can help them in extortion campaign against high-worth individuals, in this case they promise $30,000 per month ($360,000 per year).

Sales 114

A straightforward and pragmatic guide to leadership, management and teamwork

CILIP

This book translates theories in teamwork, management and leadership into practical guidance backed up with examples and case studies from current library and information workers globally. A straightforward and pragmatic guide to leadership, management and teamwork.

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources). London: Facet Publishing, 2017.

NHS is still assessing the cost of WannaCry one year later

Security Affairs

The estimate in the report considers the financial costs in two time periods: during the attack between 12 and 18 May 2017; during the recovery period in the immediate aftermath to June-July 2017; The analysis focus on two categories of cost are: Direct impact – lost output of patient care caused by reduced access to information and systems required for care leading to cancelled appointments etc.

How to start your career in cyber security

IT Governance

A version of this blog was originally published on 8 December 2017. There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities.

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. This is a guest article written by Robert A.

Risk 77