Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security.

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 129

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 121

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART ) Case Report 002 , where Fabrikam is a fake name the IT giant gave the victim.

The Data Breach Case Study & Protection Guide

Record Nations

Even the tiniest security gap can lead to a data breach. The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

IT Security – Cybersecurity; Access Controls; Breach Detection. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down.

OnDemand | Secure & Streamline Workforce and Customer Experiences

Data Breach Today

Modern Identity Customer Identity Zero Trust View this panel discussion about deployment strategies and real case studies surrounding identity modernization initiatives

Case study: The Hub by SAS


In a case study they explain that SAS had a number of requirements, including: "All communications would have to be maintained behind the firewall (for security reasons) while seamlessly integrating with other internal business systems such as SharePoint.".

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

First, the backstory: the DBA's organization wanted to tighten Db2 for z/OS data security by preventing unauthorized utilization of the authentication credentials used by an application to connect to a Db2 system. These Db2 features work together to shut down the potential security exposure just described. I've been interested in the role and trusted context features of Db2 for z/OS for a long time (I posted a two-part blog entry on the topic back in 2011).

CIPL Publishes Article on COVID-19 as a Case Study for Privacy Accountability

Hunton Privacy

On April 14, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published an article entitled “ COVID-19 Meets Privacy: A Case Study for Accountability ” (the “Article”).

Analysis: A Better Approach to Cyber Defense

Data Breach Today

The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers. Plus, a case study on cross-border payment fraud, and an expert's take on security for the 2020 elections

Security Affairs newsletter Round 258

Security Affairs

The best news of the week with Security Affairs. addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. A new round of the weekly newsletter arrived!

How Information Sharing Helped Curtail WannaCry Harm

Data Breach Today

The latest ISMG Security Reports leads with a top DHS cybersecurity leader, Jeanette Manfra, providing a case study on how information sharing helped mitigate the WannaCry attack in the U.S. Also, the SEC mulls toughening its cyber risk reporting requirements

A massive accounting hack kept clients offline and in the dark

Information Management Resources

Last week, a cyberattack took down software provider Wolters Klumer NV and presented a case study in how not to communicate with customers over a hack. Data security Cyber security Cyber attacks Malware

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

The MITRE Corporation’s ATT&CK framework has been used to evaluate the efficiency of several enterprise security products designed by several vendors. The post MITRE evaluates Enterprise security products using the ATT&CK Framework appeared first on Security Affairs.

How Secure Are Bitcoin Wallets, Really?

Security Affairs

Purchasers of Bitcoin wallets usually have one priority topping their lists: security. What’s the truth about the security of these wallets? However, purchasers of Bitcoin wallets — the software programs that facilitate storing someone’s cryptocurrency-related wealth — usually have one priority topping their lists: security. But, beyond the marketing language, what’s the truth about the security of these wallets? appeared first on Security Affairs.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. If you’re thinking about starting a career in cyber security, here are five things you should do. As with most industries, you’re much more likely to get ahead in cyber security if you have experience. Study.

[Podcast] The Impact of a Pandemic on Information Governance


Now, as our time with COVID goes on, some of the focus has shifted from short-term business concerns like how to set up a remote working strategy , how to ensure security while working from home , and how technology might be able to help contain the spread of the virus.

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security.

[Podcast] Tips for Staying Cyber-Safe While Working from Home


And finally, on this episode, hear an AIIM member case study of how Laserfiche helped Mille Lacs Corporate Ventures migrate their contract management process to the cloud. Information Security AIIM on Air

Duo Security created open tools and techniques to identify large Twitter botnet

Security Affairs

Researchers at security firm Duo Security have created a set of open source tools and disclosed techniques that could be used to identify large Twitter botnet. ” reads the research paper published by Duo Security.

7 Questions to Determine if Your Data is an Asset


This can be expensive as resources on storing, protecting, and securing information are costly. FREE Webinar: Learn more from this Case Study on Leveraging Data to Transform Customer Experience].

Why the cyber security skills gap is so damaging

IT Governance

The cyber security skills gap has been growing for years, and the problem is particularly bad in the UK. In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. However, some cyber security experts believe the skills shortage is a “myth”.

Risk 54


IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].


Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

“The message put out there is that cybercrime is lucrative and exciting, when for most of the people involved it’s absolutely not the case.”

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

In January 2019, the National Security Agency (NSA) announced the release at the RSA Conference of the free reverse engineering framework GHIDRA. Early March, the NSA has released the suite Ghidra that could be used to find vulnerabilities and security holes in applications.

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

This week, Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data. Mitsubishi Electric disclosed the security incident only after two local newspapers, the Asahi Shimbun and Nikkei , reported the security breach.

Malicious PDF Analysis

Security Affairs

” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. Most security tools must always be adapted to this new reality of attack and infection.

What did you do for European Cyber Security Month?

IT Governance

Throughout October, cyber security experts have been helping Europeans understand the importance of effective information security practices as part of Cyber Security Month. What should you remember about Cyber Security Month? Security Summit North. Cyber Security

e-Records 2019 Call for Presentations

The Texas Record

The theme this year is Better Together in a Digital World: Security and Retention. TSLAC and DIR are looking for learner-focused presentations that build core skills and share practical knowledge and experience related to digital collaboration, communication, security, and retention.

Attacking encrypted USB keys the hard(ware) way


If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies.

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

According to the cyber security community, NotPetya is a cyber weapon develped by Russia to hit the Ukrainian government. ” This decision is a case study, both companies are facing an unprecedented court case.

Crooks offer millions to skilled black hats to help them in extortion campaigns

Security Affairs

According to a new report published by the security firm Digital Shadows cybercriminal organizations are willing to pay millions to skilled hackers and malware developers. Breaking News Cyber Crime Deep Web Reports extortion Hacking malware Pierluigi Paganini Security Affairs

Sales 112

CIPL Releases Report on Effective Data Privacy Accountability

Hunton Privacy

The Report also includes 46 case studies from 17 participating organizations from different sectors, geographies and sizes – including two SMEs and a university.

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. The post Analyzing AZORult malware using NSA Ghidra suite appeared first on Security Affairs.