article thumbnail

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world.

article thumbnail

7 Questions to Determine if Your Data is an Asset

AIIM

This can be expensive as resources on storing, protecting, and securing information are costly. FREE Webinar: Learn more from this Case Study on Leveraging Data to Transform Customer Experience]. Knowledge and documentation metadata? Most organizations are currently dealing with more information than they can handle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

Your IG program should help your organization understand the value of the information you have and put processes and procedures in place to not only store this information securely but also provide access when and where required. Case studies and examples of peers in other organizations can be powerful techniques.

article thumbnail

E-Discovery Day

The Texas Record

ARMA International defines e-discovery as “the process of identifying, locating, securing, reviewing, and protecting electronic information and materials that are potentially relevant to specific litigation and may need to be produced to other parties.” Do all your electronic files have metadata that makes them searchable?

article thumbnail

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. Security experts from Duo Security have developed a collection of open source tools and disclosed techniques that can be useful in identifying large Twitter botnet.

article thumbnail

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. Its release was a sort of “ main event ” for security researchers all around the globe, which immediately started exploring its functionalities to find out its place within the reversing tool panorama.

article thumbnail

Optimizing Your Infrastructure for LAW & Explore eDiscovery

eDiscovery Daily

Real-life case study: About 8 years ago, we were working with a client that had a few virtual machines and a few physical machines. The more up to date you can test, the more secure your, and your client’s, data will be. How your processing engine gets metadata to you matters. It is fast and efficient.