Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security.

Oracle InForm Study Building

Perficient Data & Analytics

Providing resources to build and support clinical studies in InForm. The company needed to supplement its study-building capabilities with outside support. Resources from our InForm build team assisted with study builds, including library development and template creation.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey

GDPR 212

Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office.

Best Practices for a Marketing Database Cleanse

As frustrating as contact and account data management can be, this is still your database – a massive asset to your organization, even if it is rife with holes and inaccurate information. Entrusting a vendor to help maintain its accuracy and completeness is no ordinary engagement. Download ZoomInfo’s latest data-driven eBook aimed to help marketing leaders understand the best practices around choosing a B2B contact data provider.

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits. A copy of the new study is available here (PDF).

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

BEC Scams Cost U.S. Companies $300 Million Per Month: Study

Data Breach Today

Treasury Department Says an Average of 1,100 Businesses Scammed Each Month Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department.

215
215

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 164

Five Essential Pieces of a Prospecting Solution

As organizations chase new revenue targets, B2B sales leaders must examine cutting edge prospecting solutions that proactively help reps identify, connect with, and close qualified buyers faster. This eBook aims to help B2B sales leaders better understand the five essential features your prospecting solution must include.

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

Schneier on Security

did not already possess, said the study, which was produced by the Privacy and Civil Liberties Oversight Board and briefed to Congress on Tuesday. [.].

Study: IoT Devices Have Alarmingly Weak RSA Keys

Data Breach Today

Weakness Lies in Devices Without Quality Entropy Sources IoT devices are generating duplicate prime numbers while generating RSA keys, putting them at risk of a factoring attack, according to new research, which shows such an attack could be done at scale and at a low computing cost

IoT 151

Cyberattack on a Major Bank Would Have Ripple Effect: Study

Data Breach Today

Fed Warns of Consequences for Entire Financial System A cyberattack targeting one of the largest banks in the U.S. that stops the processing of payments likely would have a major ripple effect throughout the financial system, according to a new report from the Federal Reserve Bank of New York

141
141

NAID Publishes Second-hand Device Study Principles

IG Guru

It’s been twenty years since Dr. Simpson Garfunkel conducted the first study analyzing the extent to which personal information remained on second-hand hard drives. In the intervening decade, the study has been replicated many times by other universities and data recovery services.

IT 52

SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses

The Last Watchdog

Now comes a study from Boston-based consultancy Air Worldwide that puts some hard numbers on the degree to which threat actors are plundering virtual machines. According to the study, poor management of machine identities leads directly to an estimated $52 billion to $72 billion in losses annually. We had a lively discussion about the backdrop of the study, and its going-forward implications. The study looked at firmographics and technographics and factored in actual events.

C-Level & Studying for the CISSP

Dark Reading

One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took

IT 82

FDA: Make Sure EHRs Used for Clinical Studies Are Secure

Data Breach Today

Agency Issues Guidance Spelling Out Its Policy The FDA has issued new guidance spelling out its policy for organizations using electronic health record data in FDA-regulated clinical investigations, such as studies of the long-term safety of various drugs.

New Study Calls Common Risk Figure into Question

Dark Reading

A new study from the Cyentia Institute says misusing that number means that estimates are almost never accurate Many risk models use a commonly quoted number -- $150 per record -- to estimate the cost of an incident.

Risk 69

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive.

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 123

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

‘We want to stop this hemorrhaging,’ an official would later say,” states DART case study report. The post Microsoft’s case study: Emotet took down an entire network in just 8 days appeared first on Security Affairs.

Study Exposes Breadth of Cyber Risk

Dark Reading

New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well

Risk 61

Yale Study finds doctors give EHR’s an F rating via WSHU and Yale News

IG Guru

The post Yale Study finds doctors give EHR’s an F rating via WSHU and Yale News appeared first on IG GURU. Business HIPAA IG News Information Governance Coding EHR Electronic Health Records Medical Blling Yale Study

2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

A study reveals the list of worst passwords of 2019

Security Affairs

The data are quite identical to the ones reported in the studies on the worst passwords conducted by SplashData in the last years. The post A study reveals the list of worst passwords of 2019 appeared first on Security Affairs.

Q4 2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

New Study Details Business Benefits of Biometrics

Dark Reading

Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

IG Guru

The post IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now appeared first on IG Guru. Breach IG News Information Governance information privacy information security Privacy Records Management Data Breach IBM Ponemon Study

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case.

Study finds Chinese Hardware Powers U.S. Voting Machine

The Security Ledger

A new study by the firm Interos found that many hardware components in a popular touchscreen voting machine used in the U.S. The post Study finds Chinese Hardware Powers U.S.

Risk 52

Study: Consumers Blame Financial Institutions After Card Compromised

Rippleshot

A new industry study about consumer perception around fault over card compromises is a good reminder for financial institution leaders about what their cardholders are concerned about most this holiday shopping season.

52

Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020

IG Guru

The post Webinar: Case Studies on Information Governance in Microsoft 365 | 1:00pm ET on April 2, 2020 appeared first on IG GURU. Presented by John Isaza, Esq.,

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Security Affairs

” reads the study published by Chronicle. The post Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal appeared first on Security Affairs.

Study shows connections between 2000 malware samples used by Russian APT groups

Security Affairs

The study classified the samples into 60 families and 200 different modules. The post Study shows connections between 2000 malware samples used by Russian APT groups appeared first on Security Affairs.

CISCO 2020 Privacy Benchmark Study Measures Return on Investing in Privacy Accountability

Hunton Privacy

On January 27, 2020, CISCO released its 2020 Data Privacy Benchmark Study entitled “From Privacy to Profit: Achieving Positive Returns on Privacy Investments” (the “Study”). More than 2,500 respondents took part in the Study from across 13 countries.

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

Market for enterprise performance management still maturing, says new study

Information Management Resources

Dresner Advisory Services has published its Enterprise Performance Management Market Study, which looks at user perceptions, intentions and realities associated with EPM systems.

Study Points to Lax Focus on Cybersecurity

Dark Reading

Despite ranking at the top of respondents' concerns, organizations still show gaps in acting on cybersecurity, Society for Information Management (SIM) report finds

'Anonymised' data can never be totally anonymous, says study

The Guardian Data Protection

Findings say it is impossible for researchers to fully protect real identities in datasets “Anonymised” data lies at the core of everything from modern medical research to personalised recommendations and modern AI techniques.

Paper 98