A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

First, the backstory: the DBA's organization wanted to tighten Db2 for z/OS data security by preventing unauthorized utilization of the authentication credentials used by an application to connect to a Db2 system. In requesting a connection to a Db2 system, the application provides an authorization ID and an associated password (assuming authentication using an ID and a password, versus an ID and a certificate).

Emotat Malware Causes Physical Damage

Schneier on Security

The Emotet payload was delivered and executed on the systems of Fabrikam -- a fake name Microsoft gave the victim in their case study -- five days after the employee's user credentials were exfiltrated to the attacker's command and control (C&C) server.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Comics for Consumer Communication

ChiefTech

In some cases, the comic book format has been used as a way to help people get access to critical legal help. This case study from my time as a Publication Manager at the Legal Services Society (LSS) of British Columbia (BC) could inspire the use of comics outside the development process. In this case, the two departments explored different formats, and ultimately chose the comic form. His artwork provided authentic visuals for the initial book.

New book tackles the challenges of discovery in the (post-Google) era

CILIP

Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. New book tackles the challenges of discovery in the (post-Google) era.

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

An attempted attack requires user authentication.” “In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.”

How Secure Are Bitcoin Wallets, Really?

Security Affairs

So, the companies behind those wallets wisely emphasize why their products are more secure than what competitors offer and why that’s the case. The proxy microcontroller is reportedly so insecure it cannot differentiate between authentic firmware and that which a cybercriminal creates. Purchasers of Bitcoin wallets usually have one priority topping their lists: security. What’s the truth about the security of these wallets?

SamSam Ransomware operators earned more than US$5.9 Million since late 2015

Security Affairs

The security experts from Sophos have published a report on the multimillion-dollar black market business for crooks, they analyzed the SamSam ransomware case as a case study.

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. Katherine Martinez from the Trisha Brown Dance Company presented on two case studies of museum organizations, looking at records created during the exhibition process, where email was considered a problem record. Email Archiving Comes of Age.

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. The perspective is characterized by the requirement that records must possess three fundamental qualities to be considered trustworthy: accuracy, reliability, and authenticity. This article summarizes a report published by AIEF on May 30, 2019.

Why we need long-term thinking for long-term records

Preservica

Records and information governance practitioners play a vital role in easing this tension, creating dialogues and use cases to move people from a blinkered short term focus. Ensuring that long-term business critical records are authentic and readable for as long as they are needed, spans both the value and risk spectrum. Regardless of the sector you work in, there’s a tendency for users and managers to focus exclusively on the short-term.

FTC Releases Report on Facial Recognition Technology

Hunton Privacy

The report focuses on privacy concerns associated with facial recognition technology, which is becoming increasingly ubiquitous across a variety of commercial applications ranging from search engines to video games to password authentication. In the report, the FTC illustrates through case studies how companies may implement these principles. In a third case study, a social networking website uses facial recognition technology to help its users “tag” photos of their friends.

MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Evaluate capabilities by use case. Case Studies. They took the data and were able to pull the care management team from studying records to taking the patients and creating a better care plan. They had to integrate to IVR and ensure that they had authentication and authorization from the callers complete. Bottom Line: When you follow best practice and identify the right use cases, AI can provide large and verifiable value.

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

These draft guidelines highlight the data protection risks related to such applications, with general recommendations regarding the processing of personal data in relation to the non-professional use of connected vehicles and present some use cases. While it may not always be possible to resort to local data processing for every use-case, “hybrid processing” can often be put in place. The draft guidelines conclude with some case studies.

Welcome to Relativity Fest 2019!: eDiscovery Trends

eDiscovery Daily

Chief legal officers provide a unique perspective, and to analyze that perspective, Relativity and the FTI Technology business unit of FTI Consulting commissioned a study by Ari Kaplan Advisors, surveying general counsel on a wide variety of legal issues affecting business and the legal profession. Limiting the study to chief legal officers, the survey covered topics ranging from the technical competence of legal teams to preparedness for cyberattacks. Supreme Court case, Georgia v.

ChiefTech: Not Upgradable: What Enterprise 2.0 isn't

ChiefTech

isn't In the search for case studies of Enterprise 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Please seek advice for specific circumstances. Sunday, 4 February 2007 Not Upgradable: What Enterprise 2.0