Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 121

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 161

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website. Because it was spending too much time creating archives that often didn’t meet its needs, United needed a dynamic capture method that would operate automatically and preserve all of its website content in a functional, future-proof format.

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case. social media ediscovery social media collection discovery data collection capture litigation online investigation social media investigation Hanzo eDPM Advisory

A Case Study - Db2 for z/OS High-Performance DBATs

Robert's Db2

That implementation effort has involved a good bit of back-and-forth communication between myself and the Db2 administrator, and I saw that it makes for a good case study that touches on many of the issues associated with high-performance DBAT set-up, monitoring and usage. Accordingly, I decided to use this case study as the basis for a blog entry. In that case, however, the packages will be treated by Db2 as though they had been bound with RELEASE(COMMIT).

CASE STUDY: LEGIT_00004

ForAllSecure

Our defenses are usually pretty good against type 1 vulnerabilities (except in the rare cases when we have to fallback to less secure patches due to performance overhead or functionality failures). LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory.

IT 52

Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord. In a four-part series, we will be revealing the top RIM resources of the past year, as voted by your colleagues in records and information management. In this first part, we are pleased to share the [.] Read More.

Paper 78

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq., VP of Information Governance, IGS, an Access Company and Atle Skjekkeland, CEO, Infotechtion Attend this session to learn how global enterprises with up to 90,000 staff are using Office 365 for information governance, records management and information privacy and protection.

“Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra

IG Guru

The post “Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra appeared first on IG GURU. Although four categories of trade secrets had been identified—(1) virality capabilities (2) user interface/experience (“UI/UX”) (3) venue focus and (4) integration of third-party apps—the plaintiff had not identified any trade secrets with “sufficient specificity.”.

IT 43

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with. Mayhem 1 - Humans 0.

IT 40

Case Study: Workflow Management Software Integration Improves Accounting Processes for Growing Business

Document Imaging Report

Carubba Collision-DocuWare case study. Tweet. Contributed News A/P channel ECM

ECM 43

How to Use Gamification in Mobile Apps: A Case Study

IGI

I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. Gamification, or the addition of game-like elements to anything that isn’t a game, pops up all over the design world. In my last post for Boxes and Arrows , I focused specifically on gamification in mobile app onboarding.

IT 40

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 76

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down. Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. This is an important project because it allows everyone to see what records they have and where they are located.

PwC Jive Software case study

ChiefTech

A detailed backgrounder on PwC's global deployment of Jive , called Spark, reports: 80% of the frequent users think that Spark increases both their efficiency and effectiveness. Some systems with a similar scope used on a national level have already been partly or fully replaced by Spark, directly saving cost. …a a new employee who explicitly stated that Spark was among the key reasons for him to decide for PwC and against offers from the competition.

IT 46

KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

In case you're wondering, it was this period of time that inspired the name of my company Federated Media , or FM - the explosion of independent voice in radio during the 1970s was quite similar to the explosion of independent voices on the web today.but I'm taking a detour.

Virgin America's mobile social intranet case study

ChiefTech

If you are looking for more detail about VXConnect , this Salesforce Webinar features Virgin America''s Benjamin Eye , who explains the objectives behind their mobile, social intranet : The Virgin America case study itself is covered between the approximate 8 minute and 36 minute mark.

46

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

Customer Experience Management Case Studies Case study customer story Jet Privilege Loyalty and Rewards Programs OpenText Elite OpenText LiveSite OpenText TeamSiteWhen loyalty is your business, how do you support and engage your members and offer the best digital experience? Jet Privilege turned to personalizing the web experience, tailored to the needs of its members, encouraging loyalty in return.

Google Apps-based intranet: Ahold case study

ChiefTech

Since then I've shared some interesting case studies about companies using Salesforce Chatter and Microsoft Yammer. Thanks to Entopic, I can now point you to a case study presented by James Nunn at their Congress Intranet 2013 conference about Ahold. But again as other case studies have shown, this hasn't stopped Ahold from getting on with the job of using the Google stack to run its intranet.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

Because in this case the developer's connection to the Db2 system was through a Db2 Connect "gateway" server (versus a direct connection from the client via the IBM Data Server Driver), and in that case the client IP address that Db2 "sees" is the address of the Db2 Connect gateway server , not the address of the client that is "upstream" from the Db2 Connect gateway server.

Building for Billions: Addressing Security Concerns for Platforms at Scale

Threatpost

Cloud Security InfoSec Insider Akamai BeyondCorp beyondprod case study enterprise Facebook google infosec insider scale tony lauro Zero TrustLessons from Facebook and Google show how to safely scale your environment for security.

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

Size" refers in this case to aggregate in-Db2 CPU cost of SQL statement execution, and that's easy to determine: for a given workload component (a given connection type), find first the average in-Db2 (i.e., 0.000223 So in this case, aggregate CPU cost of SQL statement execution (in-Db2, or class 2, accounting time is time associated with SQL statement execution) for the DRDA workload component is (0.000169 + 0.000223) * 3620821 = 1419 CPU seconds.

Case study: The Hub by SAS

ChiefTech

In a case study they explain that SAS had a number of requirements, including: "All communications would have to be maintained behind the firewall (for security reasons) while seamlessly integrating with other internal business systems such as SharePoint.". SAS launched The Hub, based on Socialcast , in 2011.

New Case Study: Learn How Information Governance Provides an Essential Foundation for Digital Transformation

IGI

The final entry in our series of Snapshot IG case studies shows us what we can learn from Anne’s journey as she leverages her initial work on e-discovery to build a comprehensive and integrated IG program at her healthcare organization. You can read this use case and others here. About IGI Snapshots IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners.

Bringing Control to Information in a Cloud-First, Office 365 World: New IGI Case Study

IGI

We recently launched our new series of case studies about how professionals like you are tackling IG. You can read this use case and others here. IG Snapshots are compact case studies drawn from IGI’sinterviews and discussions with our community of IG practitioners. In the first Snapshot we looked at how privacy compliance and IG work hand-in-hand to reduce risk and increase information value.

Risk 20

Two new Australian case studies from Microsoft

ChiefTech

Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. NSC Group - Using a free Yammer network. (if if the article is paywalled, try this link (PDF) provided by NSC Group). A quote from Woods Bagot: “With the addition of the new social features, we can use SharePoint to help us quickly achieve a more engaging intranet.”. Note: I reviewed SharePoint 2013's social features over on the Ripple Effect Group blog.

IT 42

Today We are Launching a new Series of Information Governance Case Studies

IGI

We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners. In 2016, we worked with IG Charter Supporter, OpenText, to create the first series of Snapshots, which is now among our most widely-read publications. Today we are launching our new series of five IG Snapshots.

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

This case study reveals a typical but complex IG problem: managing the relationships among key IG players, incl uding: Outside law firms that play a central role in approving, blocking, and/or advising on key IG decisions (like information retention and preservation). Click here to access the case study in the IGI Community.

Tod Chernikoff, #InfoGov18 Speaker Interview Series

IG Guru

Featured ICRM InfoGovCon Information Governance Record Retention Records Management case study change management IBM records and information management Tod Chernikoff

IT 67

This is the old ChiefTech blog.: Janssen-Cilag Wiki Case Study

ChiefTech

Tuesday, 21 August 2007 Janssen-Cilag Wiki Case Study Here is a great Aussie wiki case study shared by Nathan Wallace from Janssen-Cilag , a pharmaceutical subsidiary of Johnson & Johnson. This is the old ChiefTech blog. Nice of you to drop in and visit.

Vital documents: How one biopharma company protected theirs against water damage

TAB OnRecord

Download our case study for a complete list of solutions » 1.0 Manage risk Physical filing Storage systems Case Study filing systems mobile shelving records management SprinklersMost companies have a plan in place to protect their vital documents in the event of a fire. But what if the same devices used to protect against fire, caused significant damage? The Challenge A large biopharmaceutical company was faced with this very [.] Read More.

Crawling COVID-19: What (and how) web archivists collect

Archive-It

In this case, that digital space is less a parallel publishing platform for institutions than a subject in and of itself, with context and character of its own to capture and represent. Case Studies COVID-19by Karl-Rainer Blumenthal, Web Archivist for Archive-It.

This is the old ChiefTech blog.: Avenue A | Razorfish Wiki Case Study

ChiefTech

Friday, 14 September 2007 Avenue A | Razorfish Wiki Case Study OK. Now were talking Wiki Case Study. " Technorati tags: Wiki , Enteprise 2.0 , Enterprise Web 2.0 , Portal , Case Study , Avenue A | Razorfish , Mike Gotta at 10:11 PM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. This is the old ChiefTech blog. Nice of you to drop in and visit.

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study. I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios.

Cloud 57