Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down. News Data Management eRecords erecords 2018

How to Use Gamification in Mobile Apps: A Case Study


I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place.

IT 52

Case Study: Workflow Management Software Integration Improves Accounting Processes for Growing Business

Document Imaging Report

Carubba Collision-DocuWare case study. Tweet. Contributed News A/P channel ECM

ECM 43

Tod Chernikoff, #InfoGov18 Speaker Interview Series

IG Guru

We’re pleased to bring you a series of interviews with some of the presenters at The Information Governance Conference 2018. Featured ICRM InfoGovCon Information Governance Record Retention Records Management case study change management IBM records and information management Tod Chernikoff

IT 67

e-Records Conference 2018: Registration Open!

The Texas Record

e-Records 2018 – Friday, November 16, 2018. Registration is open to state agency and local government staff for the 2018 e-Records Conference. About e-Records 2018. Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive


On July 1, 2018 Mexican voters went to the polls to decide the fate of their entire federal government: one president, 500 members of congress, and 128 senators. Case Studiesby Natalie Baur, Biblioteca Daniel Cosío Villegas of the Colegio de México.

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc.

Archiving and describing mass tragedy: the Web Archive on the October 1, 2017 Shooting in Las Vegas, Nevada


Reflecting on our mission to document Southern Nevada, we realized that we had a critical responsibility to preserve this history so we could study, remember, and reflect on it later. Archiving Spontaneous Events Case Studies

Nuevas opciones, nuevas direcciones: Proyecto piloto del Archivo Web de sitios web gubernamentales mexicanos 2018


El 1 de julio de 2018, los votantes mexicanos acudieron a las urnas para decidir el destino de todo su gobierno federal: un presidente, 500 miembros del Congreso y 128 senadores. Case Studiespor Natalie Baur, Biblioteca Daniel Cosío Villegas, El Colegio de México.

Join Our Sessions at MuleSoft CONNECT 2018

Perficient Data & Analytics

Today kicks off MuleSoft CONNECT 2018 – a conference that is centered on helping attendees learn to design, build, and manage integrations and APIs like experts. Attendees will hear about Ameren’s own experiences and use case studies. Perficient is proud to be a sponsor at this year’s MuleSoft CONNECT 2018. Integration & IT Modernization News api API implementation API Strategy APIM mulesoft MuleSoft Connect 2018 OAuth2 Rest API SOA

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners


Provincial Candidates 2017 collection, an outcome of a collaboration started at BC Gov Info Day 2017 at Simon Fraser University, Burnaby, and a case of using–or trying to use–online political party resources to build comprehensive seed lists. Case Studies Collaborative Collecting

Analyze your Web Archives at Scale: The Archives Unleashed Cloud


We’d love to connect with you – whether you’d like to chat about web archives, your experience with AUK, contribute a case study, or join our growing community, there are a number of ways to connect with our team and community: Follow us on Twitter. Case Studies How To

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community


City Councilor Bill Dwight’s Instagram images of the 2018 March for Our Lives. Case Studies Collaborative Collecting Community Websby Dylan Gaffney, Forbes Library.

Expand the reach of Archive-It collections with these access integrations


Case Studies How ToBy Jillian Lohndorf, Web Archivist for Archive-It.

Archiving the Web @EBRPL: Creating and following a web collecting policy in a public library


The Section 108 Study Group recommends collectors give content creators the right to opt out of having their content collected or made publically available. Decorative wall hanging by Osa Atoe on display at Baton Rouge’s Firehouse Gallery in May, 2018.

Saving Local News on the Web


Case Studies Community WebsThe following is a guest post by Diana Bowers-Smith, Archivist, Brooklyn Collection, at the Brooklyn Public Library.

Describing web archives: Learning from Archive-It partners and friends


In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. For even more information about UNC’s cases and next steps, see Jessica’s own For the Record blog post, Behind the Scenes: Describing Archived Websites. . Please share your insights, case studies, and questions to keep it going!

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. Katherine Martinez from the Trisha Brown Dance Company presented on two case studies of museum organizations, looking at records created during the exhibition process, where email was considered a problem record. Email Archiving Comes of Age.

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. On November 14, 2018, the International Association of Insurance Supervisors (IAIS) published its proposed Holistic Framework for Systemic Risk in the Insurance Sector (Holistic Framework) for a public consultation period ending January 25, 2019.

Paper 65

Partner in the news: Freedom of the Press Foundation archives online journalism at risk


Archive-It Partner News Case Studies PressBy Karl-Rainer Blumenthal. It’s comforting to know that with the help of Freedom of Press and Archive-It, the internet never forgets. So ends a thorough report by Wired ’s Louise Matsakis on the news that the Freedom of the Press Foundation would work with Archive-It to archive the websites of alternative news outlets before new owners can change or remove their contents.

SAA/CoSA/NAGARA 2018 recap: Session 103

The Schedule

In the case study focusing on ExxonMobil, Tansey showed how these three functions applied. Guest post by Cathrine Giles, State Records Branch Manager, Kentucky Department for Libraries and Archives. Wicked problems are defined as societal problems that are complex, vitally important, ill-defined, and rely on contested political judgements for resolution. Even just defining the scope and nature of a problem can be difficult.

How Honda is using cognitive search to drive real changes in quality assurance

IBM Big Data Hub

This IDC case study estimates that the digital universe will grow 40 percent per year over the next decade and, by 2020 it will reach an astounding 44ZB or 44 trillion gigabytes Today, unstructured information represents more than 90% of the information within organizations.

IT 73

Best of TAB 2017 part 3: the top white papers

TAB OnRecord

In a four-part series, we are bringing you the top case studies, white papers, blog posts, and guides – all chosen by your records management colleagues!

Paper 106

Archive-It Partner News, May 2018


We hope you can join us for an afternoon partner meeting on Tuesday, August 14, 2018 preceding ARCHIVES*RECORDS 2018 , the joint annual meeting of CoSA, NAGARA, and SAA. To share your ideas, use cases, and to become a beta tester, contact us directly at: ait [at] archive [dot] org.

e-Records Conference: Price Increase on October 26!

The Texas Record

About e-Records 2018. Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. News Training DIR eRecords erecords 2018 Local Governments State Agencies TSLACReminder to register now and save $25 on your registration fee! Early registration fee is $65.

Q&A: The troubling implications of normalizing encryption backdoors — for government use

The Last Watchdog

I had an invigorating discussion with Jeff Hudson, CEO of Venafi , about this at Black Hat USA 2018. In this case it’s an encryption key. Venafi: Cambridge Analytica is just an amazing case study of what can happen when machines can actually pull all this information together, and the massive power of that. Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today?

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

In the first phase, MITRE offered the possibility to evaluate the service and its efficiency on a case study on APT3/Gothic Panda cyber espionage group. The initial evaluations included the above vendors that signed up before the June 30, 2018 cohort deadline.

Identifying People by Metadata

Schneier on Security

In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies.


IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].


Manufacturing 4.0? Industry 4.0? It’s all digital manufacturing to me

OpenText Information Management

This three-day event was full of presentations, case studies and discussions on the journey to Manufacturing 4.0. I recently attended the Manufacturers Leadership Summit hosted by Frost & Sullivan in LA.

Essential guidance to prevent business continuity disasters

IT Governance

January’s book of the month, In Hindsight: A compendium of Business Continuity case studies , is an essential guide for anyone working in business continuity planning or disaster recovery.

Estimating the Cost of Internet Insecurity

Schneier on Security

Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to put a number on this. They then ran a set of case studies to show the model's functionality and to compare the results against those in the existing literature.

Risk 81

How Secure Are Bitcoin Wallets, Really?

Security Affairs

So, the companies behind those wallets wisely emphasize why their products are more secure than what competitors offer and why that’s the case. This case study, as well as others associated with less-than-locked-down Bitcoin wallets, emphasizes how people should not get too comfortable after buying a Bitcoin wallet, even one considered as being among the best of the best. And, in August 2018, a security research firm called OverSoft NL claimed success.

Hunting down Gooligan — retrospective analysis


Beside its scale what makes Gooligan a worthwhile case-study is its heavy reliance on stolen oauth tokens to attack Google Play’s API, an approach previously unheard of in malware. This talk provides a retrospective on how during 2017 Check Point and Google jointly hunted down Gooligan – one of the largest Android botnets at the time.

IT 48

Seeking good industrial use cases for virtual or augmented reality

Information Management Resources

Training is one use case where there’s some value. Then the good case studies with tangible value start to dry up. I want to see where the tools make a real and lasting difference. Remote assistance is another. Augmented reality Virtual reality Data management


Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. This is a guest article written by Robert A.

Risk 68

NHS is still assessing the cost of WannaCry one year later

Security Affairs

The report includes a case study related a “large NHS mental health trust” that was protected with Advanced Threat Protection that allowed to repeal a phishing email attack with a weaponized excel spreadsheet attachment. The UK’s Department of Health and Social Care provided an update on the efforts to secure the NHS IT infrastructure, with a focus on WannaCry overall costs.

SamSam Ransomware operators earned more than US$5.9 Million since late 2015

Security Affairs

The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study.