Case Study: Improving ID and Access Management

Data Breach Today

Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview What are some of moves that organizations can make to improve their identity and access management?

Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey

Study 212

Case Study: Moving to DevSecOps

Data Breach Today

Since Sentara Healthcare adopted a DevSecOps approach, CISO Daniel Bowden says, his security team has gained improved visibility into the entire application development process

BEC Scams Cost U.S. Companies $300 Million Per Month: Study

Data Breach Today

Treasury Department Says an Average of 1,100 Businesses Scammed Each Month Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department.

Study 209

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

NAID Publishes Second-hand Device Study Principles

IG Guru

It’s been twenty years since Dr. Simpson Garfunkel conducted the first study analyzing the extent to which personal information remained on second-hand hard drives. In the intervening decade, the study has been replicated many times by other universities and data recovery services.

Study 52

'Anonymised' data can never be totally anonymous, says study

The Guardian Data Protection

Findings say it is impossible for researchers to fully protect real identities in datasets “Anonymised” data lies at the core of everything from modern medical research to personalised recommendations and modern AI techniques.

Study 113

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

IG Guru

The post IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now appeared first on IG Guru. Breach IG News Information Governance information privacy information security Privacy Records Management Data Breach IBM Ponemon Study

Study 65

2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

Study 114

Email still the favorite getaway tool for data thieves, study finds

Information Management Resources

Cyber criminals continue to use email as a main vehicle for stealing data and delivering advanced threats, according to a recent study by security company Mimecast.

Study 82

Artificial intelligence enthusiasm outpacing adoption, study finds

Information Management Resources

Artificial intelligence and machine learning have become essential for organizations to stay competitive. But adoption is lagging even among key decision-makers championing change. Artificial intelligence Machine learning Data strategy

Cloud adoptions are obscuring data visibility, says new study

Information Management Resources

The cloud is creating configuration and data visibility problems, according to a report from the Cloud Security Alliance, an organization that defines best practices for cloud security. Cloud computing Data visualization Data quality Cloud hosting

Study 86

Cybersecurity investments good for the bottom line, study reveals

Information Management Resources

In turns out that the more 'cyber ready' a business becomes, the better its overall business outcomes, according to a recent study by telecommunications company Vodafone. Cyber security Data security Cyber attacks Malware

Study 86

Greater data security investments needed for 5G success, warns study

Information Management Resources

Mobile service providers anticipate new opportunities from the coming deployment of high-speed 5G networks and many new Internet of Things use cases. But they also think much-improved security will be essential to realizing that potential. Networks Network security Data security

Study 90

Perceptions and reality of cyber defenses differ widely, study reveals

Information Management Resources

There is a sizable gap between confidence in cyber security programs and their effectiveness, according to a study by data management software provide Syncsort. Data security Cyber security Cyber attacks

Study 74

Q4 2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

Study 106

Study Exposes Breadth of Cyber Risk

Dark Reading

New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well

Study 58

Hanzo CASE STUDY: eDPM Advisory Services

Hanzo Learning Center

In this case study, we explore how Hanzo customer, eDPM Advisory Services helped their customer with preserving, collecting, producing, and presenting information from novel and challenging data sources to strengthen their case.

Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal

Security Affairs

” reads the study published by Chronicle. The post Chronicle’s study reveals CAs that issued most certificates to sign malware samples on VirusTotal appeared first on Security Affairs.

Study 96

First Museum Studies courses receive CILIP accreditation

CILIP

First Museum Studies courses receive CILIP accreditation. The MA in Museums and Gallery Practice at UCL Qatar and the MSc Museum Studies at the University of Glasgow have gained formal CILIP accreditation following recent assessment visits.

European Commission Releases Study on GDPR Data Protection Certification Mechanisms

Hunton Privacy

The European Commission (the “Commission”) has released a long-awaited study on GDPR data protection certification mechanisms (the “Study”). The Study’s key takeaways include: The GDPR, while making clear the object of certification, does not limit the subject matter to one specific area—potentially covering the full spectrum of a controller or processor’s GDPR obligations.

Study 79

New Study Details Business Benefits of Biometrics

Dark Reading

Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord.

More women are studying software engineering, weakening ‘pipeline’ myth

Information Management Resources

But merely getting more women to study software provides no guarantee that the graduates will seek careers in technology or stay in those jobs if they find them. Hardware and software Data science Data Scientist

Study 62

ICRM Partners with the University of Toronto School of Continuing Studies

IG Guru

The Institute is pleased to announce a strategic partnership with the University of Toronto School of Continuing Studies (SCS) that aligns the education and exams provided in its Records & Information Management Certificate with the requirements for the Certified Records Analyst (CRA) credential.

Study 52

Cybersecurity skills gap growing even wider, says new study

Information Management Resources

With two-thirds of organizations already saying they have a shortage of cybersecurity professionals, the cyber security workforce gap is widening even more. Data security Cyber security Cyber attacks

Study 72

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that. Security

Study 87

Greater 'data literacy' means higher profitability, says study

Information Management Resources

Large enterprises that have higher corporate data literacy experience can expect $320 million to $534 million in higher enterprise value. Data management Data strategy Data mining

Study 69

Good productivity doesn't come from bad document management, study confirms

Information Management Resources

Improper document management is inhibiting employee productivity, according to new research by information management platform provider M-Files Corp. Data management Data discovery Data strategy

Study 63

NIH study probes impact of heavy screen time on young brains

Information Management Resources

Brain scans of adolescents who are heavy users of smartphones, tablets and video games look different from those of less active screen users, a new study reveals. Mobile technology Hardware and software Customer experience

Video 60

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales eSecurity

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Security: moving up the executive stack.

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales eSecurity

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Security: moving up the executive stack.

National Academy of Sciences Encryption Study

Data Matters

Which makes all the more welcome last week’s issuance of the long-awaited National Academy of Sciences study , “Decrypting the Encryption Debate: A Framework for Decision Makers.” To that end, the study, among other things, highlights (in section 2.3) Nonetheless, the study is well worth a read, not least as preparation for participating in the encryption debates that signs suggest may pick up again soon. Few would describe 2017 as a quiet year.

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

New Study: The Impact of Data Breaches on Customer Trust

Rippleshot

A new study indicates there is a high level of disconnect between consumer trust over how organizations handle personal data, and how those companies perceive being equipped to fully protect that data. This study, which was conducted by analyst firm Frost & Sullivan, digs into how consumers trust organizations to protect their digital data.

Study 40

Thales Study Reveals 49% of IT Decision Makers Feel Cloud Apps Are the Biggest Targets of Digital Threats

Thales eSecurity

The post Thales Study Reveals 49% of IT Decision Makers Feel Cloud Apps Are the Biggest Targets of Digital Threats appeared first on Data Security Blog | Thales eSecurity. It is no secret that organizations are increasingly adopting cloud technology and apps into their IT environments.

Study 63

More big data initiatives moving to the cloud, study finds

Information Management Resources

Organizations need to continue to build an agile data environment that can accommodate traditional BI platforms in concert with a modern information environment. Big data Data management Data discovery

Universities offer quick-hit studies in AI, machine learning

Information Management Resources

MIT has announced seven new courses added to its 2018 Short Programs, covering such technologies as artificial intelligence, machine learning, automation and computational design. Artificial intelligence Machine learning Data science

Study 67

Cisco Study Finds Fewer Data Breaches at GDPR-Ready Firms

Dark Reading

Many organizations find that getting their data privacy house in order is paying off

Study 73