article thumbnail

Case Study: Enhancing Endpoint Security

Data Breach Today

Because it's inevitable that some attackers will get around defenses, Kettering Health Network added an extra layer of endpoint security to help mitigate the risks posed by ransomware and other cyberthreats, says Michael Berry, director of information security. He describes what's unusual about the approach.

Security 179
article thumbnail

Case Study: How IU Health Manages Vendor Security Risk

Data Breach Today

What are some of the most important aspects in managing vendor security risk when taking on third-parties to handle sensitive data? Mitch Parker, CISO of Indiana University Health, explains the critical steps his organization is taking in its approach to vendor risk.

Risk 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Watch out, ransomware attack risk increases on holidays and weekends, FBI and CISA

Security Affairs

” Clearly, the FBI and CISA focus on attacks against organizations in the United States, they proposed as case studies the attacks against Colonial Pipeline , JBS , and Kaseya. The post Watch out, ransomware attack risk increases on holidays and weekends, FBI and CISA appeared first on Security Affairs.

article thumbnail

Case Studies on Fraud and AML Collaboration

Data Breach Today

While AML primarily is a compliance-driven function, fraud is a risk management function driven by the organization's risk appetite for fraud, said Ian Mitchell, co-founder of Mission Omega.

article thumbnail

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders who want to learn: Case studies showing value derived from predictive analytics.

article thumbnail

Vulnerabilities in Microsoft apps for macOS allow stealing permissions

Security Affairs

Despite these risks, Microsoft considers the issues low-risk and declined to fix them, stating that some apps need to allow unsigned libraries for plugin support. The researchers warn that by disabling library validation, Microsoft may be bypassing macOS’s hardened runtime security, exposing users to unnecessary risks.

Libraries 324
article thumbnail

Malicious PDF Analysis

Security Affairs

” Let’s go to our case study: I received a scan request for a PDF file that was reported to support an antivirus vendor, and it replied that the file was not malicious. The team needed evidence to prove the risk involved in the file. Then I thought, “Why not turn a PDF analysis into an article?”

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.