Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office.

Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey

GDPR 212

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 132

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

BEC Scams Cost U.S. Companies $300 Million Per Month: Study

Data Breach Today

Treasury Department Says an Average of 1,100 Businesses Scammed Each Month Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department.

217
217

NAID Publishes Second-hand Device Study Principles

IG Guru

It’s been twenty years since Dr. Simpson Garfunkel conducted the first study analyzing the extent to which personal information remained on second-hand hard drives. In the intervening decade, the study has been replicated many times by other universities and data recovery services.

IT 52

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk

Risk 125

FDA: Make Sure EHRs Used for Clinical Studies Are Secure

Data Breach Today

Agency Issues Guidance Spelling Out Its Policy The FDA has issued new guidance spelling out its policy for organizations using electronic health record data in FDA-regulated clinical investigations, such as studies of the long-term safety of various drugs.

Study Exposes Breadth of Cyber Risk

Dark Reading

New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well

Risk 81

Study shows connections between 2000 malware samples used by Russian APT groups

Security Affairs

The study classified the samples into 60 families and 200 different modules. The post Study shows connections between 2000 malware samples used by Russian APT groups appeared first on Security Affairs.

Maybe shadow IT isn’t so bad after all, study suggests via ZDNet

IG Guru

The post Maybe shadow IT isn’t so bad after all, study suggests via ZDNet appeared first on IG GURU. IT leaders agree shadow IT serves as a force of innovation and productivity. End-users simply need more guidance and support.

IT 52

2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case.

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

IG Guru

The post IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now appeared first on IG Guru. Breach IG News Information Governance information privacy information security Privacy Records Management Data Breach IBM Ponemon Study

Q4 2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

New Study Details Business Benefits of Biometrics

Dark Reading

Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence

'Anonymised' data can never be totally anonymous, says study

The Guardian Data Protection

Findings say it is impossible for researchers to fully protect real identities in datasets “Anonymised” data lies at the core of everything from modern medical research to personalised recommendations and modern AI techniques.

Paper 112

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Security Affairs

” reads the study published by Chronicle. The post Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal appeared first on Security Affairs.

First Museum Studies courses receive CILIP accreditation

CILIP

First Museum Studies courses receive CILIP accreditation. The MA in Museums and Gallery Practice at UCL Qatar and the MSc Museum Studies at the University of Glasgow have gained formal CILIP accreditation following recent assessment visits.

European Commission Releases Study on GDPR Data Protection Certification Mechanisms

Hunton Privacy

The European Commission (the “Commission”) has released a long-awaited study on GDPR data protection certification mechanisms (the “Study”). The Study’s key takeaways include: The GDPR, while making clear the object of certification, does not limit the subject matter to one specific area—potentially covering the full spectrum of a controller or processor’s GDPR obligations.

GDPR 79

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

The Security of Data in the Cloud is Your Responsibility Unveiling the 2019 Thales Cloud Security Study

Thales eSecurity

In fact, according to the 2019 Thales Cloud Security Study , the average company uses 29 cloud services. The post The Security of Data in the Cloud is Your Responsibility Unveiling the 2019 Thales Cloud Security Study appeared first on Data Security Blog | Thales eSecurity.

Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 102

Study the Cutting Edge of Cybersecurity at Black Hat Asia

Dark Reading

Whether you want an in-depth look at one of the biggest data breaches in recent memory or some advanced data forensics training, Black Hat Asia is the place to be

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that. Security

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales eSecurity

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Security: moving up the executive stack.

ICRM Partners with the University of Toronto School of Continuing Studies

IG Guru

The Institute is pleased to announce a strategic partnership with the University of Toronto School of Continuing Studies (SCS) that aligns the education and exams provided in its Records & Information Management Certificate with the requirements for the Certified Records Analyst (CRA) credential.

Cisco Study Finds Fewer Data Breaches at GDPR-Ready Firms

Dark Reading

Many organizations find that getting their data privacy house in order is paying off

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales eSecurity

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Security: moving up the executive stack.

No, The Mafia Doesn't Own Cybercrime: Study

Dark Reading

Organized crime does, however, sometimes provide money-laundering and other expertise to cybercriminals

67

Twitter Still Can't Keep Up With Its Flood of Junk Accounts, Study Finds

WIRED Threat Level

Meanwhile, two Iowa researchers built an AI engine they say can spot abusive apps on Twitter months before the service itself. Security

IT 88

Artificial intelligence enthusiasm outpacing adoption, study finds

Information Management Resources

Artificial intelligence and machine learning have become essential for organizations to stay competitive. But adoption is lagging even among key decision-makers championing change. Artificial intelligence Machine learning Data strategy

National Academy of Sciences Encryption Study

Data Matters

Which makes all the more welcome last week’s issuance of the long-awaited National Academy of Sciences study , “Decrypting the Encryption Debate: A Framework for Decision Makers.” To that end, the study, among other things, highlights (in section 2.3) Nonetheless, the study is well worth a read, not least as preparation for participating in the encryption debates that signs suggest may pick up again soon. Few would describe 2017 as a quiet year.

Cybersecurity investments good for the bottom line, study reveals

Information Management Resources

In turns out that the more 'cyber ready' a business becomes, the better its overall business outcomes, according to a recent study by telecommunications company Vodafone. Cyber security Data security Cyber attacks Malware

Perceptions and reality of cyber defenses differ widely, study reveals

Information Management Resources

There is a sizable gap between confidence in cyber security programs and their effectiveness, according to a study by data management software provide Syncsort. Data security Cyber security Cyber attacks