Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

Case Study: Where to Begin Your Zero Trust Journey

Data Breach Today

Amit Basu of International Seaways on the Various Approaches to Zero Trust As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security.

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

Case Study: Intrusion Prevention, Detection in the Cloud

Data Breach Today

Chronic disease management firm Omada Health has been changing its approach to cloud intrusion prevention and detection, which is reducing time spent on investigating false positives, says the company's information security leader, Bill Dougherty

Cloud 151

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 119

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 157

Case Study: Tackling CIAM Challenges During the Pandemic

Data Breach Today

The federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Versatile Retention™ and Consulting Case Study: More Than a Vendor – Why Zasio is a Trusted Partner for this Global Pharmaceutical Company

IG Guru

Check out the case study post here. The post Versatile Retention™ and Consulting Case Study: More Than a Vendor – Why Zasio is a Trusted Partner for this Global Pharmaceutical Company appeared first on IG GURU.

Announcing the new RM Case Studies series

The Schedule

SAA’s Records Management Section is excited to announce the launching of a new peer-reviewed case study series under the umbrella of SAA Publications. Suggested case study length is 2,500 to 5,000 words. Elements of the case study include: introduction background/prior relevant work/institutional context challenge addressed strategies and resources employed analysis of successes and setbacks future plans. RM case studies

Case Study: Improving Point-Of-Sale Security With Biometrics

HID Global

Case Study: Improving Point-Of-Sale Security With Biometrics. sparthasaradhi. Mon, 06/27/2022 - 11:25

Sales 52

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 117

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.

CGS-CIMB Case Study: Mobile Access for Financial Services

HID Global

CGS-CIMB Case Study: Mobile Access for Financial Services. Mon, 04/11/2022 - 12:07

Webinar: Stop, Drop, and Innovate: Six Case Studies via Mid-Michigan ARMA Chapter on Thursday, December 17th at 4pm Eastern

IG Guru

The post Webinar: Stop, Drop, and Innovate: Six Case Studies via Mid-Michigan ARMA Chapter on Thursday, December 17th at 4pm Eastern appeared first on IG GURU. ARMA Education Information Governance Records Management Webinar Case Studies Innovation Mid-Michigan ARMA Service Providers

Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website.

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

Case Study: Automated Contact Tracing in HID Malaysia Manufacturing

HID Global

Case Study: Automated Contact Tracing in HID Malaysia Manufacturing. raufreiter. Tue, 01/04/2022 - 12:28

Healthcare Case Study: Contact Tracing and Care Continuity

HID Global

Healthcare Case Study: Contact Tracing and Care Continuity. raufreiter. Thu, 12/02/2021 - 11:44

52

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

Retail Case Study: ?abka Streamlines Access Control and Enhances User Experience

HID Global

Retail Case Study: ?abka abka Streamlines Access Control and Enhances User Experience. sshale. Tue, 01/25/2022 - 10:06

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case. social media ediscovery social media collection discovery data collection capture litigation online investigation social media investigation Hanzo eDPM Advisory

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

How Real-Time Location Systems Enable Continuity of Care During COVID-19: A Case Study with TPIRC

HID Global

How Real-Time Location Systems Enable Continuity of Care During COVID-19: A Case Study with TPIRC. raufreiter. Thu, 12/02/2021 - 11:44

52

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

A Case Study - Db2 for z/OS High-Performance DBATs

Robert's Db2

That implementation effort has involved a good bit of back-and-forth communication between myself and the Db2 administrator, and I saw that it makes for a good case study that touches on many of the issues associated with high-performance DBAT set-up, monitoring and usage.

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq.,

The Lighting the Way project team is pleased to announce the publication of The Lighting the Way Handbook: Case Studies, Guidelines, and Emergent Futures for Archival Discovery and Delivery, edited by Mark A. Matienzo and Dinah Handel

IG Guru

The post The Lighting the Way project team is pleased to announce the publication of The Lighting the Way Handbook: Case Studies, Guidelines, and Emergent Futures for Archival Discovery and Delivery, edited by Mark A. Check out this publication from the Standford Libarary.

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with. Mayhem 1 - Humans 0.

IT 40

CASE STUDY: LEGIT_00004

ForAllSecure

Our defenses are usually pretty good against type 1 vulnerabilities (except in the rare cases when we have to fallback to less secure patches due to performance overhead or functionality failures). LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 40

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with. Mayhem 1 - Humans 0.

IT 40

Case Study: Unmatched benefits of Mac-specific security at Scrive

Jamf

Case Study: Workflow Management Software Integration Improves Accounting Processes for Growing Business

Info Source

Carubba Collision-DocuWare case study. Tweet. Contributed News A/P channel ECM

ECM 43

Webinar: Taming the Beast – A Case Study in Microsoft Teams Governance on December 15, 2020 12pm MST via ARMA Mile High Denver Chapter

IG Guru

The post Webinar: Taming the Beast – A Case Study in Microsoft Teams Governance on December 15, 2020 12pm MST via ARMA Mile High Denver Chapter appeared first on IG GURU. REGISTRATION LINK Microsoft Teams was introduced as a Slack competitor in 2017, and by April 2020 had surpassed 75 million daily active users.

“Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra

IG Guru

The post “Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra appeared first on IG GURU.

IT 52

BuzzFeed Achieves Greater Efficiency and Confidence Using Hanzo Hold to Manage Its Slack Data

Hanzo Learning Center

ediscovery Technology Case Study Slack enterprise Slack BuzzFeed

IT 52

The University of Washington Streamlines Its Records Management Program via Zasio

IG Guru

IG News Information Governance Records Management case study The University of Washington ZasioCheck out the post here! The post The University of Washington Streamlines Its Records Management Program via Zasio appeared first on IG GURU.