Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

Study: Breach Victims Rarely Change Passwords

Data Breach Today


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IAPP published Privacy Risk Study 2021

IG Guru

Check out the study here. The post IAPP published Privacy Risk Study 2021 appeared first on IG GURU. IG News 2021 IAPP Privacy Study

Risk 68

US Government to Study Cyber Insurance Backstop

Data Breach Today

Cyber Insurers Limit Financial Exposure While Risk Grows The Department of Treasury and the Cybersecurity and Infrastructure Agency are soliciting comments on whether risks to critical infrastructure from a catastrophic cyber attack - and the concurrent potential for ruinous financial exposure by insurers - should lead to a new federal approach.

Best Practices for a Marketing Database Cleanse

As frustrating as contact and account data management can be, this is still your database – a massive asset to your organization, even if it is rife with holes and inaccurate information. Entrusting a vendor to help maintain its accuracy and completeness is no ordinary engagement. Download ZoomInfo’s latest data-driven eBook aimed to help marketing leaders understand the best practices around choosing a B2B contact data provider.

Case Study: Where to Begin Your Zero Trust Journey

Data Breach Today

Amit Basu of International Seaways on the Various Approaches to Zero Trust As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company.

Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey

GDPR 212

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security.

Phishing for Feds: Credential-Harvesting Attacks Found in New Study


A study by researchers at Lookout has found that credential-harvesting phishing attacks against US government employees rose by 30% last year. The researchers also found that nearly 50% of US government employees are running older, unpatched versions of iOS and Android operating systems.

A study on malicious plugins in WordPress Marketplaces

Security Affairs

The experts studied the evolution of CMS plugins in the production web servers dating back to 2012, to do this they developed an automated framework named YODA to detect malicious plugins. The post A study on malicious plugins in WordPress Marketplaces appeared first on Security Affairs.

CMS 106

5 Essential Pieces of a Prospecting Solution

As organizations chase new revenue targets, B2B sales leaders must examine cutting edge prospecting solutions that proactively help reps identify, connect with, and close qualified buyers faster. This eBook aims to help B2B sales leaders better understand the five essential features your prospecting solution must include.

Strong Password Policy Isn't Enough, Study Shows

Dark Reading

New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise

Fed Studies Development of Digital Dollar

Data Breach Today

The pandemic has accelerated the shift to e-commerce and raised new concerns about the use of paper money. Jim Cunha of the Federal Reserve Bank of Boston describes a collaborative research project with the Massachusetts Institute of Technology to determine the feasibility of a digital alternative

Paper 170

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

IBM Cost of a Data Breach study: average Cost of Data Breach exceeds $4.2M

Security Affairs

IBM Security presented today the annual study “Cost of Data Breach,” conducted by Ponemon Institute and sponsored and analyzed by IBM, which is based on data related to data breaches suffered by over 500 organizations between May 2020 and March 2021. ” reads the study.

The Advantages of Free and Open-Source Software Vs. Open-Core Software

Instaclustr commissioned Forrester Consulting to conduct a custom study to assess application development decision-makers’ understanding of the benefits of using open-core software vs. free and open source software (FOSS). Check out the findings!

Studying an 'Invisible God' Hacker: Could You Stop 'Fxmsp'?

Data Breach Today

Successful Hacking Operation Often Relied on Simple, Easy-to-Block Tactics Could your organization withstand an attack by the master hacking operation known as "Fxmsp"? Hollywood loves to portray hackers as having ninja-like skills.

Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Access 132

Study reveals top 200 most common passwords

Security Affairs

The annual study on top-used passwords published by Nordpass revealed that we are still using weak credentials that expose us to serious risks. the study is based on the analysis of a 4TB database containing passwords across 50 countries.

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

Powering Personalization Through Customer Data

Finding the right CDP can help unlock the value of your customer data. This eBook offers guidance on choosing, deploying, and utilizing a CDP, along with a case study on how one bank put data into action to forge stronger connections with customers.

Case Study: Intrusion Prevention, Detection in the Cloud

Data Breach Today

Chronic disease management firm Omada Health has been changing its approach to cloud intrusion prevention and detection, which is reducing time spent on investigating false positives, says the company's information security leader, Bill Dougherty

Cloud 151

Academic Study Finds Security Flaws in Online Voting Tool

Data Breach Today

OmniBallot Voting Platform Is Vulnerable to Hacking, Researchers Say Researchers at MIT and the University of Michigan have uncovered multiple security flaws in the online voting platform OmniBallot which could allow hackers to access and manipulate voter data.

Case Study: Tackling CIAM Challenges During the Pandemic

Data Breach Today

The federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin

Hackers Can Use Light Bulbs to Eavesdrop: Study

Data Breach Today

Here's How a Light Bulb's Vibrations Can Be Used to Intercept Conversations A new research paper describes a side-channel attack technique that could enable hackers to eavesdrop on a conversation by tracking vibrations in a hanging light bulb

Paper 194

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

Access 164

Looking for a Virtual CRA or CRM study group? Check out the latest WiredIn Podcast

IG Guru

Maria Martinez-Carey interviews Richard Gureski from ARMA Milwaukee on how his ARMA chapter is adapting to virtual meetings, and how they set up a growing virtual ICRM CRA and CRM study group available to anyone who contributes to the profession.

Study Finds Open Source Vulnerabilities Doubled in 2019

Data Breach Today

Increasing Use of Open Source Software Creates More Opportunities for Flaws The number of reported vulnerabilities found in open source software more than doubled in 2019 to almost 1,000, with projects such as Magento, GitLab, and Jenkins posting the largest increases, according to security firm RiskSense.

Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office.

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Case Studies: Managing Identity With Blockchain

Data Breach Today

Pioneers Test Using the Technology for Identity and Access Management Government agencies and private sector organizations around the world are experimenting with the use of blockchain to help manage digital identity. Here are three examples of pioneering efforts in the U.S., Canada and India

Incognia Mobile App Study Reveals Low Detection of Location Spoofing in Dating Apps

Dark Reading

With over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety


Versatile Retention™ and Consulting Case Study: More Than a Vendor – Why Zasio is a Trusted Partner for this Global Pharmaceutical Company

IG Guru

Check out the case study post here. The post Versatile Retention™ and Consulting Case Study: More Than a Vendor – Why Zasio is a Trusted Partner for this Global Pharmaceutical Company appeared first on IG GURU.

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

Nearly a quarter of healthcare organizations hit by ransomware attacks experienced an increase in patient mortality, according to a study from Ponemon Institute and Proofpoint released today.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Phishing Simulation Study Shows Why These Attacks Remain Pervasive

Dark Reading

E-mail purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Krebs on Security

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits. As PBS noted in its coverage of the Vanderbilt study, after data breaches as many as 36 additional deaths per 10,000 heart attacks occurred annually at the hundreds of hospitals examined. A copy of the new study is available here (PDF).

Unpatched Browsers Abound, Study Shows

Dark Reading

Google Chrome users don't always take time to relaunch browser updates, and some legacy applications don't support new versions of Chrome, Menlo Security says

Announcing the new RM Case Studies series

The Schedule

SAA’s Records Management Section is excited to announce the launching of a new peer-reviewed case study series under the umbrella of SAA Publications. Suggested case study length is 2,500 to 5,000 words. Elements of the case study include: introduction background/prior relevant work/institutional context challenge addressed strategies and resources employed analysis of successes and setbacks future plans. RM case studies

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.