article thumbnail

Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

article thumbnail

Call for case studies: Libraries - Building the future economy

CILIP

Call for case studies: Libraries - Building the future economy Building the future economy We are working with an external agency to strengthen our advocacy activity during 2024, to engage with decision makers at the highest level. Contact Keith now.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview. What are some of moves that organizations can make to improve their identity and access management?

Access 145
article thumbnail

[Podcast] Pepsi's AP Automation Case Study

AIIM

The company's four largest European entities were still keying invoicing and credit memo data manually for all of their accounts payable processes. On this episode of the AIIM on Air Podcast , we take a look at this interesting case study.

Libraries 125
article thumbnail

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Having insights about people, such as understanding purchase intent or pinpointing future inventory needs, gives products the ability to leverage that data and provide significant added value. How to de-risk predictive analytics such as how to avoid a lawsuit that might come out of bias in data and algorithms.

article thumbnail

Case Study: Where to Begin Your Zero Trust Journey

Data Breach Today

Amit Basu of International Seaways on the Various Approaches to Zero Trust As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company.

article thumbnail

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Cloud 261
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.