Cisco Studies Global Impact of GDPR

Data Breach Today

Cisco is out with findings from its 2019 Data Privacy Benchmark Study, which shows the impact of GDPR compliance as well as how customers are asking more questions about how their data is secured. Cisco Chief Privacy Officer Michelle Dennedy analyzes the survey

Study 202

Healthcare Case Study: Identity and Access Management

Data Breach Today

How can a large healthcare delivery system efficiently handle identity and access management for thousands of clinicians and other users of patient data? Robert Siebenthaler of PeaceHealth explains how his organization, which operates 10 medical centers, has developed a fine-tuned, role-based approach

FDA: Make Sure EHRs Used for Clinical Studies Are Secure

Data Breach Today

Agency Issues Guidance Spelling Out Its Policy The FDA has issued new guidance spelling out its policy for organizations using electronic health record data in FDA-regulated clinical investigations, such as studies of the long-term safety of various drugs.

Study 137

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

IG Guru

The post IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now appeared first on IG Guru. Breach IG News Information Governance information privacy information security Privacy Records Management Data Breach IBM Ponemon Study

Study 65

Perceptions and reality of cyber defenses differ widely, study reveals

Information Management Resources

There is a sizable gap between confidence in cyber security programs and their effectiveness, according to a study by data management software provide Syncsort. Data security Cyber security Cyber attacks

Study 78

2017 Security Transformation Study: Results Analysis

Data Breach Today

This survey was conducted online in the summer 2017, and it generated more than 260 responses from security leaders around the globe, with emphasis on North America, EMEA, India and APAC. Responses were consistent from organizations in all regions and sectors, with little statistical deviation. Forty percent of the respondent organizations have 10,000 or more employees

Study 108

Artificial intelligence enthusiasm outpacing adoption, study finds

Information Management Resources

Artificial intelligence and machine learning have become essential for organizations to stay competitive. But adoption is lagging even among key decision-makers championing change. Artificial intelligence Machine learning Data strategy

Cybersecurity investments good for the bottom line, study reveals

Information Management Resources

In turns out that the more 'cyber ready' a business becomes, the better its overall business outcomes, according to a recent study by telecommunications company Vodafone. Cyber security Data security Cyber attacks Malware

Study 87

New Study Details Business Benefits of Biometrics

Dark Reading

Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence

Best of TAB 2017 part 1: the top case studies

TAB OnRecord

Over the next four days we will share the top white papers, case studies, RIM guides and blog posts. The post Best of TAB 2017 part 1: the top case studies appeared first on TAB Records Management Blog | TAB OnRecord.

The Data Breach Case Study & Protection Guide

Record Nations

The post The Data Breach Case Study & Protection Guide appeared first on Record Nations. Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Data Security

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Security: moving up the executive stack.

Study the Cutting Edge of Cybersecurity at Black Hat Asia

Dark Reading

Whether you want an in-depth look at one of the biggest data breaches in recent memory or some advanced data forensics training, Black Hat Asia is the place to be

Twitter Still Can't Keep Up With Its Flood of Junk Accounts, Study Finds

WIRED Threat Level

Meanwhile, two Iowa researchers built an AI engine they say can spot abusive apps on Twitter months before the service itself. Security

Study 68

Cisco Study Finds Fewer Data Breaches at GDPR-Ready Firms

Dark Reading

Many organizations find that getting their data privacy house in order is paying off

Study 72

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that. Security

Study 87

Key Findings from the 2017 Thales Encryption Trends Study: Australia

Thales Data Security

The 2017 Thales Encryption Trends Study Australia found the IT department’s influence over encryption strategy has more than halved in the past five years from 59 per cent to 28 per cent. Security: moving up the executive stack.

Good productivity doesn't come from bad document management, study confirms

Information Management Resources

Improper document management is inhibiting employee productivity, according to new research by information management platform provider M-Files Corp. Data management Data discovery Data strategy

New Study: The Impact of Data Breaches on Customer Trust

Rippleshot

A new study indicates there is a high level of disconnect between consumer trust over how organizations handle personal data, and how those companies perceive being equipped to fully protect that data. This study, which was conducted by analyst firm Frost & Sullivan, digs into how consumers trust organizations to protect their digital data.

Study 40

Cybersecurity skills gap growing even wider, says new study

Information Management Resources

With two-thirds of organizations already saying they have a shortage of cybersecurity professionals, the cyber security workforce gap is widening even more. Data security Cyber security Cyber attacks

Study 76

National Academy of Sciences Encryption Study

Data Matters

Which makes all the more welcome last week’s issuance of the long-awaited National Academy of Sciences study , “Decrypting the Encryption Debate: A Framework for Decision Makers.” To that end, the study, among other things, highlights (in section 2.3) Nonetheless, the study is well worth a read, not least as preparation for participating in the encryption debates that signs suggest may pick up again soon. Few would describe 2017 as a quiet year.

No, The Mafia Doesn't Own Cybercrime: Study

Dark Reading

Organized crime does, however, sometimes provide money-laundering and other expertise to cybercriminals

Study 60

Greater 'data literacy' means higher profitability, says study

Information Management Resources

Large enterprises that have higher corporate data literacy experience can expect $320 million to $534 million in higher enterprise value. Data management Data strategy Data mining

Study 73

More women are studying software engineering, weakening ‘pipeline’ myth

Information Management Resources

But merely getting more women to study software provides no guarantee that the graduates will seek careers in technology or stay in those jobs if they find them. Hardware and software Data science Data Scientist

Study 65

NIH study probes impact of heavy screen time on young brains

Information Management Resources

Brain scans of adolescents who are heavy users of smartphones, tablets and video games look different from those of less active screen users, a new study reveals. Mobile technology Hardware and software Customer experience

Video 60

Studying the birds after a war

Archives Blogs

Our partnership with the Institute on World War II and the Human Experience has introduced me to some of the most interesting people of the Greatest Generation. I added a new one to my list this week as I loaded a set of photographs from Dr. Oliver L. Austin Jr. Students working for Dr. Annika A.

Study 32

Cambridge University rejected Facebook study over 'deceptive' privacy standards

The Guardian Data Protection

Exclusive: panel told researcher Aleksandr Kogan that Facebook’s approach fell ‘far below ethical expectations’ A Cambridge University ethics panel rejected research by the academic at the centre of the Facebook data harvesting scandal over the social network’s “deceptive” approach to its users privacy, newly released documents reveal.

Study 77

How to Use Gamification in Mobile Apps: A Case Study

IGI

I’ll examine Forest, a productivity app, as a case study of gamification embedded so deeply into an app’s framework that gamification becomes the entire reason to use the app in the first place.

More big data initiatives moving to the cloud, study finds

Information Management Resources

Organizations need to continue to build an agile data environment that can accommodate traditional BI platforms in concert with a modern information environment. Big data Data management Data discovery

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

Customer Experience Management Case Studies Case study customer story Jet Privilege Loyalty and Rewards Programs OpenText Elite OpenText LiveSite OpenText TeamSiteWhen loyalty is your business, how do you support and engage your members and offer the best digital experience?

Universities offer quick-hit studies in AI, machine learning

Information Management Resources

MIT has announced seven new courses added to its 2018 Short Programs, covering such technologies as artificial intelligence, machine learning, automation and computational design. Artificial intelligence Machine learning Data science

Study 76

As Right to Repair Effort Falters, Massachusetts moves to study Impact

The Security Ledger

After failing to move a bill to enshrine a right to repair consumer electronics to a vote, the state lawmakers in Massachusetts are pushing to study the economic impact of right to repair legislation.

A Case Study: Measuring the Impact of Db2 for z/OS Buffer Pool Changes

Robert's Db2

Not long ago, a Db2 for z/OS administrator contacted me with a request. His team had made some changes to the buffer pool configuration in their production Db2 environment (the overall size of the buffer pool configuration was increased to reduce read I/O activity , and greater use was made of large real storage page frames ), and they were not sure as to how the performance impact of these changes could be measured. Could I assist with that analysis? Sure, I said.

Central banks urged to study digital currency risks and rewards

Information Management Resources

The BIS concluded that wholesale digital currencies and their underlying technologies have the potential to make settlement of securities and derivatives transactions more efficient. Cryptocurrencies Bitcoin Fintech

Study 69

Case Study: Workflow Management Software Integration Improves Accounting Processes for Growing Business

Document Imaging Report

Carubba Collision-DocuWare case study. Tweet. Contributed News A/P channel ECM

Facebook suspends app tied to researcher running election study

Information Management Resources

Facebook Inc. has suspended apps by Crimson Hexagon, a company founded by a Harvard University researcher who has a close relationship with the social network. Data management Facebook

Study 60

Mayo Clinic, UK firm sign pact to study blockchain

Information Management Resources

The working agreement with Medicalchain to explore potential benefits of tech in healthcare. Blockchain EHR testing EHR implementations Mayo Clinic

Advanced tech workplaces provide more job satisfaction, motivation, says study

Information Management Resources

Findings revealed 'a clear chasm' in employee performance and sentiment between more advanced digital workplaces and those that employ digital technology to a lesser degree. Workplace culture Hardware and software Data management

Study 60

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even. Security

Study 72

University of Maryland to study advanced computing in healthcare

Information Management Resources

Partnership with Inovalon will use machine learning, neural networks to achieve findings from EHR data. Machine Learning Networks EHR documentation Document management EHR

Study 69