Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Case Study: Tackling CIAM Challenges During the Pandemic

Data Breach Today

The federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin

Access 163

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Cloud 163

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 132

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 164

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Announcing the new RM Case Studies series

The Schedule

SAA’s Records Management Section is excited to announce the launching of a new peer-reviewed case study series under the umbrella of SAA Publications. Suggested case study length is 2,500 to 5,000 words. Elements of the case study include: introduction background/prior relevant work/institutional context challenge addressed strategies and resources employed analysis of successes and setbacks future plans. RM case studies

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 125

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.

Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website.

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

Webinar: Stop, Drop, and Innovate: Six Case Studies via Mid-Michigan ARMA Chapter on Thursday, December 17th at 4pm Eastern

IG Guru

The post Webinar: Stop, Drop, and Innovate: Six Case Studies via Mid-Michigan ARMA Chapter on Thursday, December 17th at 4pm Eastern appeared first on IG GURU. ARMA Education Information Governance Records Management Webinar Case Studies Innovation Mid-Michigan ARMA Service Providers

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case. social media ediscovery social media collection discovery data collection capture litigation online investigation social media investigation Hanzo eDPM Advisory

A Case Study - Db2 for z/OS High-Performance DBATs

Robert's Db2

That implementation effort has involved a good bit of back-and-forth communication between myself and the Db2 administrator, and I saw that it makes for a good case study that touches on many of the issues associated with high-performance DBAT set-up, monitoring and usage.

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq.,

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord. In a four-part series, we will be revealing the top RIM resources of the past year, as voted by your colleagues in records and information management. In this first part, we are pleased to share the [.] Read More.

Paper 78

Case Study: Unmatched benefits of Mac-specific security at Scrive

Jamf

“Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra

IG Guru

The post “Pin Down” Your Trade Secrets So the Court Can “Do Its Job” A Case Study via JD Supra appeared first on IG GURU.

IT 56

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with. Mayhem 1 - Humans 0.

IT 40

CASE STUDY: LEGIT_00004

ForAllSecure

Our defenses are usually pretty good against type 1 vulnerabilities (except in the rare cases when we have to fallback to less secure patches due to performance overhead or functionality failures). LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 40

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with. Mayhem 1 - Humans 0.

IT 40

Case Study: Workflow Management Software Integration Improves Accounting Processes for Growing Business

Document Imaging Report

Carubba Collision-DocuWare case study. Tweet. Contributed News A/P channel ECM

ECM 43

BuzzFeed Achieves Greater Efficiency and Confidence Using Hanzo Hold to Manage Its Slack Data

Hanzo Learning Center

ediscovery Technology Case Study Slack enterprise Slack BuzzFeed

IT 52

Webinar: Taming the Beast – A Case Study in Microsoft Teams Governance on December 15, 2020 12pm MST via ARMA Mile High Denver Chapter

IG Guru

The post Webinar: Taming the Beast – A Case Study in Microsoft Teams Governance on December 15, 2020 12pm MST via ARMA Mile High Denver Chapter appeared first on IG GURU. REGISTRATION LINK Microsoft Teams was introduced as a Slack competitor in 2017, and by April 2020 had surpassed 75 million daily active users.

How to Use Gamification in Mobile Apps: A Case Study

IGI

I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place. Gamification, or the addition of game-like elements to anything that isn’t a game, pops up all over the design world. In my last post for Boxes and Arrows , I focused specifically on gamification in mobile app onboarding.

IT 40

Building for Billions: Addressing Security Concerns for Platforms at Scale

Threatpost

Cloud Security InfoSec Insider Akamai BeyondCorp beyondprod case study enterprise Facebook google infosec insider scale tony lauro Zero TrustLessons from Facebook and Google show how to safely scale your environment for security.

The University of Washington Streamlines Its Records Management Program via Zasio

IG Guru

IG News Information Governance Records Management case study The University of Washington ZasioCheck out the post here! The post The University of Washington Streamlines Its Records Management Program via Zasio appeared first on IG GURU.

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 76

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down. Due to the complexity of information in its various forms, your local government offices and state agencies may need to create a records management data map, showing the location of the records within your organization. This is an important project because it allows everyone to see what records they have and where they are located.

PwC Jive Software case study

ChiefTech

A detailed backgrounder on PwC's global deployment of Jive , called Spark, reports: 80% of the frequent users think that Spark increases both their efficiency and effectiveness. Some systems with a similar scope used on a national level have already been partly or fully replaced by Spark, directly saving cost. …a a new employee who explicitly stated that Spark was among the key reasons for him to decide for PwC and against offers from the competition.

IT 46

Virgin America's mobile social intranet case study

ChiefTech

If you are looking for more detail about VXConnect , this Salesforce Webinar features Virgin America''s Benjamin Eye , who explains the objectives behind their mobile, social intranet : The Virgin America case study itself is covered between the approximate 8 minute and 36 minute mark.

46

Google Apps-based intranet: Ahold case study

ChiefTech

Since then I've shared some interesting case studies about companies using Salesforce Chatter and Microsoft Yammer. Thanks to Entopic, I can now point you to a case study presented by James Nunn at their Congress Intranet 2013 conference about Ahold. But again as other case studies have shown, this hasn't stopped Ahold from getting on with the job of using the Google stack to run its intranet.

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

Customer Experience Management Case Studies Case study customer story Jet Privilege Loyalty and Rewards Programs OpenText Elite OpenText LiveSite OpenText TeamSiteWhen loyalty is your business, how do you support and engage your members and offer the best digital experience? Jet Privilege turned to personalizing the web experience, tailored to the needs of its members, encouraging loyalty in return.

Case study: The Hub by SAS

ChiefTech

In a case study they explain that SAS had a number of requirements, including: "All communications would have to be maintained behind the firewall (for security reasons) while seamlessly integrating with other internal business systems such as SharePoint.". SAS launched The Hub, based on Socialcast , in 2011.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

Because in this case the developer's connection to the Db2 system was through a Db2 Connect "gateway" server (versus a direct connection from the client via the IBM Data Server Driver), and in that case the client IP address that Db2 "sees" is the address of the Db2 Connect gateway server , not the address of the client that is "upstream" from the Db2 Connect gateway server.