Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Announcing the new RM Case Studies series

The Schedule

SAA’s Records Management Section is excited to announce the launching of a new peer-reviewed case study series under the umbrella of SAA Publications. Suggested case study length is 2,500 to 5,000 words. Elements of the case study include: introduction background/prior relevant work/institutional context challenge addressed strategies and resources employed analysis of successes and setbacks future plans. RM case studies

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 163

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website.

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 119

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim. “We are glad to share the DART Case Report 002: Full Operational Shutdown. ‘We want to stop this hemorrhaging,’ an official would later say,” states DART case study report.

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

Case Study: Unmatched benefits of Mac-specific security at Scrive

Jamf

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case. social media ediscovery social media collection discovery data collection capture litigation online investigation social media investigation Hanzo eDPM Advisory

A Case Study - Db2 for z/OS High-Performance DBATs

Robert's Db2

That implementation effort has involved a good bit of back-and-forth communication between myself and the Db2 administrator, and I saw that it makes for a good case study that touches on many of the issues associated with high-performance DBAT set-up, monitoring and usage.

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord. In a four-part series, we will be revealing the top RIM resources of the past year, as voted by your colleagues in records and information management. In this first part, we are pleased to share the [.] Read More.

Paper 78

Webinar: Taming the Beast – A Case Study in Microsoft Teams Governance on December 15, 2020 12pm MST via ARMA Mile High Denver Chapter

IG Guru

The post Webinar: Taming the Beast – A Case Study in Microsoft Teams Governance on December 15, 2020 12pm MST via ARMA Mile High Denver Chapter appeared first on IG GURU. REGISTRATION LINK Microsoft Teams was introduced as a Slack competitor in 2017, and by April 2020 had surpassed 75 million daily active users.

BuzzFeed Achieves Greater Efficiency and Confidence Using Hanzo Hold to Manage Its Slack Data

Hanzo Learning Center

ediscovery Technology Case Study Slack enterprise Slack BuzzFeed

IT 52

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq., VP of Information Governance, IGS, an Access Company and Atle Skjekkeland, CEO, Infotechtion Attend this session to learn how global enterprises with up to 90,000 staff are using Office 365 for information governance, records management and information privacy and protection.

CASE STUDY: LEGIT_00004

ForAllSecure

Our defenses are usually pretty good against type 1 vulnerabilities (except in the rare cases when we have to fallback to less secure patches due to performance overhead or functionality failures). LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 40

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with. Mayhem 1 - Humans 0.

IT 40

The University of Washington Streamlines Its Records Management Program via Zasio

IG Guru

IG News Information Governance Records Management case study The University of Washington ZasioCheck out the post here! The post The University of Washington Streamlines Its Records Management Program via Zasio appeared first on IG GURU.

Case Study: Workflow Management Software Integration Improves Accounting Processes for Growing Business

Document Imaging Report

Carubba Collision-DocuWare case study. Tweet. Contributed News A/P channel ECM

ECM 43

“Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra

IG Guru

The post “Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra appeared first on IG GURU. Although four categories of trade secrets had been identified—(1) virality capabilities (2) user interface/experience (“UI/UX”) (3) venue focus and (4) integration of third-party apps—the plaintiff had not identified any trade secrets with “sufficient specificity.”.

IT 43

How to Use Gamification in Mobile Apps: A Case Study

IGI

I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. Gamification, or the addition of game-like elements to anything that isn’t a game, pops up all over the design world. In my last post for Boxes and Arrows , I focused specifically on gamification in mobile app onboarding.

IT 40

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 76

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down. Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. This is an important project because it allows everyone to see what records they have and where they are located.

PwC Jive Software case study

ChiefTech

A detailed backgrounder on PwC's global deployment of Jive , called Spark, reports: 80% of the frequent users think that Spark increases both their efficiency and effectiveness. Some systems with a similar scope used on a national level have already been partly or fully replaced by Spark, directly saving cost. …a a new employee who explicitly stated that Spark was among the key reasons for him to decide for PwC and against offers from the competition.

IT 46

Virgin America's mobile social intranet case study

ChiefTech

If you are looking for more detail about VXConnect , this Salesforce Webinar features Virgin America''s Benjamin Eye , who explains the objectives behind their mobile, social intranet : The Virgin America case study itself is covered between the approximate 8 minute and 36 minute mark.

46

Google Apps-based intranet: Ahold case study

ChiefTech

Since then I've shared some interesting case studies about companies using Salesforce Chatter and Microsoft Yammer. Thanks to Entopic, I can now point you to a case study presented by James Nunn at their Congress Intranet 2013 conference about Ahold. But again as other case studies have shown, this hasn't stopped Ahold from getting on with the job of using the Google stack to run its intranet.

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

Customer Experience Management Case Studies Case study customer story Jet Privilege Loyalty and Rewards Programs OpenText Elite OpenText LiveSite OpenText TeamSiteWhen loyalty is your business, how do you support and engage your members and offer the best digital experience? Jet Privilege turned to personalizing the web experience, tailored to the needs of its members, encouraging loyalty in return.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

Because in this case the developer's connection to the Db2 system was through a Db2 Connect "gateway" server (versus a direct connection from the client via the IBM Data Server Driver), and in that case the client IP address that Db2 "sees" is the address of the Db2 Connect gateway server , not the address of the client that is "upstream" from the Db2 Connect gateway server.

Case study: The Hub by SAS

ChiefTech

In a case study they explain that SAS had a number of requirements, including: "All communications would have to be maintained behind the firewall (for security reasons) while seamlessly integrating with other internal business systems such as SharePoint.". SAS launched The Hub, based on Socialcast , in 2011.

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

Size" refers in this case to aggregate in-Db2 CPU cost of SQL statement execution, and that's easy to determine: for a given workload component (a given connection type), find first the average in-Db2 (i.e., 0.000223 So in this case, aggregate CPU cost of SQL statement execution (in-Db2, or class 2, accounting time is time associated with SQL statement execution) for the DRDA workload component is (0.000169 + 0.000223) * 3620821 = 1419 CPU seconds.

Building for Billions: Addressing Security Concerns for Platforms at Scale

Threatpost

Cloud Security InfoSec Insider Akamai BeyondCorp beyondprod case study enterprise Facebook google infosec insider scale tony lauro Zero TrustLessons from Facebook and Google show how to safely scale your environment for security.

New Case Study: Learn How Information Governance Provides an Essential Foundation for Digital Transformation

IGI

The final entry in our series of Snapshot IG case studies shows us what we can learn from Anne’s journey as she leverages her initial work on e-discovery to build a comprehensive and integrated IG program at her healthcare organization. You can read this use case and others here. About IGI Snapshots IG Snapshots are compact case studies drawn from IGI’s interviews and discussions with our community of IG practitioners.

KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

In case you're wondering, it was this period of time that inspired the name of my company Federated Media , or FM - the explosion of independent voice in radio during the 1970s was quite similar to the explosion of independent voices on the web today.but I'm taking a detour. In fact, it's rather a case study of what NOT to do if you have a product so good, people actually do work to tell you more about themselves.

Two new Australian case studies from Microsoft

ChiefTech

Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. NSC Group - Using a free Yammer network. (if if the article is paywalled, try this link (PDF) provided by NSC Group). A quote from Woods Bagot: “With the addition of the new social features, we can use SharePoint to help us quickly achieve a more engaging intranet.”. Note: I reviewed SharePoint 2013's social features over on the Ripple Effect Group blog.

IT 42

Bringing Control to Information in a Cloud-First, Office 365 World: New IGI Case Study

IGI

We recently launched our new series of case studies about how professionals like you are tackling IG. You can read this use case and others here. IG Snapshots are compact case studies drawn from IGI’sinterviews and discussions with our community of IG practitioners. In the first Snapshot we looked at how privacy compliance and IG work hand-in-hand to reduce risk and increase information value.

Risk 20

Download Our Newest Comprehensive Case Study on Les Schwab

IGI

This case study reveals a typical but complex IG problem: managing the relationships among key IG players, incl uding: Outside law firms that play a central role in approving, blocking, and/or advising on key IG decisions (like information retention and preservation). Click here to access the case study in the IGI Community.