article thumbnail

Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

article thumbnail

Case Study: Where to Begin Your Zero Trust Journey

Data Breach Today

Amit Basu of International Seaways on the Various Approaches to Zero Trust As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview. What are some of moves that organizations can make to improve their identity and access management?

Access 149
article thumbnail

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Cloud 264
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach.

Security 179
article thumbnail

Charter Hall Case Study: Mobile Access Provides a Secure Yet Frictionless Tenant Experience

HID Global

The Charter Hall case study explores their decision to leverage mobile access control as a component of the security system for a seamless tenant experience.

Access 52
article thumbnail

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Do you know what’s annoying? Getting constant alerts that something is broken with your product, despite there being nothing wrong. Alert fatigue is a real thing. There was a time when technology managers needed to actively monitor these kinds of granular metrics, but today, these alerts just create distracting noise.

article thumbnail

Leading Advertising and Analytics Company Outperforms With a Graph Database

Download the case study to learn more! Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before.

article thumbnail

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders who want to learn: Case studies showing value derived from predictive analytics. There are risks that need to be consciously addressed, and successful implementation requires the right strategy.