Study: Breach Victims Rarely Change Passwords

Data Breach Today

Researchers Call on Breached Companies to Revamp Notification Even after being notified that their personal data has been compromised in a breach, only about a third of users change their passwords - and most are not strong or unique, according to a study by researchers at Carnegie Mellon University, who call for changes in breach notification procedures

Fed Studies Development of Digital Dollar

Data Breach Today

The pandemic has accelerated the shift to e-commerce and raised new concerns about the use of paper money. Jim Cunha of the Federal Reserve Bank of Boston describes a collaborative research project with the Massachusetts Institute of Technology to determine the feasibility of a digital alternative

Paper 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey

GDPR 212

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Oracle InForm Study Building

Perficient Data & Analytics

Providing resources to build and support clinical studies in InForm. The company needed to supplement its study-building capabilities with outside support. Resources from our InForm build team assisted with study builds, including library development and template creation. Multiple studies built in compliance with the company’s SOPs. Oracle InForm Study-in-a-Box Jump Start. Does your organization face similar study-building challenges?

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 125

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

Unpatched Browsers Abound, Study Shows

Dark Reading

Google Chrome users don't always take time to relaunch browser updates, and some legacy applications don't support new versions of Chrome, Menlo Security says

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 163

Best Practices for a Marketing Database Cleanse

As frustrating as contact and account data management can be, this is still your database – a massive asset to your organization, even if it is rife with holes and inaccurate information. Entrusting a vendor to help maintain its accuracy and completeness is no ordinary engagement. Download ZoomInfo’s latest data-driven eBook aimed to help marketing leaders understand the best practices around choosing a B2B contact data provider.

Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office.

Academic Study Finds Security Flaws in Online Voting Tool

Data Breach Today

OmniBallot Voting Platform Is Vulnerable to Hacking, Researchers Say Researchers at MIT and the University of Michigan have uncovered multiple security flaws in the online voting platform OmniBallot which could allow hackers to access and manipulate voter data. The platform is currently in use in three states for military personnel and disabled residents

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits. As PBS noted in its coverage of the Vanderbilt study, after data breaches as many as 36 additional deaths per 10,000 heart attacks occurred annually at the hundreds of hospitals examined. A copy of the new study is available here (PDF).

Hackers Can Use Light Bulbs to Eavesdrop: Study

Data Breach Today

Here's How a Light Bulb's Vibrations Can Be Used to Intercept Conversations A new research paper describes a side-channel attack technique that could enable hackers to eavesdrop on a conversation by tracking vibrations in a hanging light bulb

Paper 143

Five Essential Pieces of a Prospecting Solution

As organizations chase new revenue targets, B2B sales leaders must examine cutting edge prospecting solutions that proactively help reps identify, connect with, and close qualified buyers faster. This eBook aims to help B2B sales leaders better understand the five essential features your prospecting solution must include.

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Looking for a Virtual CRA or CRM study group? Check out the latest WiredIn Podcast

IG Guru

Maria Martinez-Carey interviews Richard Gureski from ARMA Milwaukee on how his ARMA chapter is adapting to virtual meetings, and how they set up a growing virtual ICRM CRA and CRM study group available to anyone who contributes to the profession.

Study Finds Open Source Vulnerabilities Doubled in 2019

Data Breach Today

Increasing Use of Open Source Software Creates More Opportunities for Flaws The number of reported vulnerabilities found in open source software more than doubled in 2019 to almost 1,000, with projects such as Magento, GitLab, and Jenkins posting the largest increases, according to security firm RiskSense

Forrester study finds cloud security fears unfounded

OpenText Information Management

To explore how and why (or why not) enterprises are … The post Forrester study finds cloud security fears unfounded appeared first on OpenText Blogs. This blog is co-authored by Alison Clarke and Sandi Nelson.

Cloud 59

Studying an 'Invisible God' Hacker: Could You Stop 'Fxmsp'?

Data Breach Today

Successful Hacking Operation Often Relied on Simple, Easy-to-Block Tactics Could your organization withstand an attack by the master hacking operation known as "Fxmsp"? Hollywood loves to portray hackers as having ninja-like skills. But Fxmsp often favored the simplest tools for the job, because they so often worked. Defenders: Take note

119
119

BEC Scams Cost U.S. Companies $300 Million Per Month: Study

Data Breach Today

Treasury Department Says an Average of 1,100 Businesses Scammed Each Month Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department. The report pinpoints which sectors are hardest hit by this type of fraud

159
159

Webinar: Stop, Drop, and Innovate: Six Case Studies via Mid-Michigan ARMA Chapter on Thursday, December 17th at 4pm Eastern

IG Guru

The post Webinar: Stop, Drop, and Innovate: Six Case Studies via Mid-Michigan ARMA Chapter on Thursday, December 17th at 4pm Eastern appeared first on IG GURU. ARMA Education Information Governance Records Management Webinar Case Studies Innovation Mid-Michigan ARMA Service Providers

Case study - United Airlines Can Revisit the Past, Thanks to Hanzo’s Dynamic Website Archives

Hanzo Learning Center

Archiving Case Study web archive website preservation Hanzo Dynamic Capture dynamic web capture web archivingObjective. United Airlines has a massive, complex, ever-changing website.

NAID Publishes Second-hand Device Study Principles

IG Guru

It’s been twenty years since Dr. Simpson Garfunkel conducted the first study analyzing the extent to which personal information remained on second-hand hard drives. In the intervening decade, the study has been replicated many times by other universities and data recovery services. NAID itself has commissioned such studies twice; one several years ago in Australia […]. The post NAID Publishes Second-hand Device Study Principles appeared first on IG GURU.

IT 40

Study: IoT Devices Have Alarmingly Weak RSA Keys

Data Breach Today

Weakness Lies in Devices Without Quality Entropy Sources IoT devices are generating duplicate prime numbers while generating RSA keys, putting them at risk of a factoring attack, according to new research, which shows such an attack could be done at scale and at a low computing cost

IoT 113

Study Exposes Breadth of Cyber Risk

Dark Reading

New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well

Risk 60

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 119

Cyberattack on a Major Bank Would Have Ripple Effect: Study

Data Breach Today

Fed Warns of Consequences for Entire Financial System A cyberattack targeting one of the largest banks in the U.S. that stops the processing of payments likely would have a major ripple effect throughout the financial system, according to a new report from the Federal Reserve Bank of New York

107
107

SoReL-20M Sophos & ReversingLabs release 10 million disarmed samples for malware study

Security Affairs

The post SoReL-20M Sophos & ReversingLabs release 10 million disarmed samples for malware study appeared first on Security Affairs. Sophos and ReversingLabs released SoReL-20M, a database containing 20 million Windows Portable Executable files, including 10M malware samples.

SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses

The Last Watchdog

Now comes a study from Boston-based consultancy Air Worldwide that puts some hard numbers on the degree to which threat actors are plundering virtual machines. According to the study, poor management of machine identities leads directly to an estimated $52 billion to $72 billion in losses annually. We had a lively discussion about the backdrop of the study, and its going-forward implications. The study looked at firmographics and technographics and factored in actual events.

2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

FDA: Make Sure EHRs Used for Clinical Studies Are Secure

Data Breach Today

Agency Issues Guidance Spelling Out Its Policy The FDA has issued new guidance spelling out its policy for organizations using electronic health record data in FDA-regulated clinical investigations, such as studies of the long-term safety of various drugs.

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

Schneier on Security

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of Americans' domestic phone calls and text messages cost $100 million from 2015 to 2019, but yielded only a single significant investigation, according to a newly declassified study. did not already possess, said the study, which was produced by the Privacy and Civil Liberties Oversight Board and briefed to Congress on Tuesday. [.].

SolarWinds Hack Could Affect 18K Customers

Krebs on Security

“The lawsuits are coming, and I hope they have a good general counsel,” said James Lewis , senior vice president at the Center for Strategic and International Studies.

Q4 2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

C-Level & Studying for the CISSP

Dark Reading

One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took

IT 63

New Study Calls Common Risk Figure into Question

Dark Reading

A new study from the Cyentia Institute says misusing that number means that estimates are almost never accurate Many risk models use a commonly quoted number -- $150 per record -- to estimate the cost of an incident.

Risk 60

New Study Details Business Benefits of Biometrics

Dark Reading

Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence

Study Finds 15 Billion Stolen, Exposed Credentials in Criminal Markets

Dark Reading

Data is fueling account takeover attacks in a big way, Digital Shadows says