MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
CFO
April 1, 2008
Scott Leibs
Firewall of Silence Data security breaches are rampant, and costly. So why don't C-level executives talk about them? mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
IEEE Spectrum
May 2005
Riordan, Wespi & Zamboni
How to Hook Worms Because a computer network cannot ward off every last Internet worm, it must sound an alarm the minute one slithers inside. mark for My Articles similar articles
CFO
November 17, 2003
Joseph C. Panettieri
Security It's a classic technology dilemma: businesses know they must protect their computers from devoted hackers and disgruntled employees, but how much is too much? More computers equals more vulnerability, and more spending. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
CIO
March 9, 2012
Stephanie Overby
IT Service Providers and Customers Battle Over Data Breaches IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud. mark for My Articles similar articles
CIO
November 1, 2001
Sarah D. Scalet
See You in Court Inadequate security leaves companies open not just to hackers but to lawsuits. Realize why lawsuits over failed information security are imminent. Determine how your company may be liable for damage caused by hackers. Learn how to prepare and respond... mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
CIO
June 15, 2003
Dylan Tweney
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. mark for My Articles similar articles
CFO
September 1, 2002
Scott Leibs
Lesson from 9/11: It's Not about Data A year after 9/11, are businesses prepared for any contingency? mark for My Articles similar articles
Entrepreneur
November 2003
Jane Easter Bahls
This Means War Put up your best fight to protect your network, or you could be held liable for damages to customers. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
CFO
November 17, 2003
Polly Schneider Traylor
Outsourcing More work is being sent packing, often far away. To make it pay off, management must adapt. mark for My Articles similar articles
InternetNews
November 16, 2006
Roy Mark
Guidance Software Settles With FTC Guidance Software agreed Thursday to settle Federal Trade Commission charges that the computer forensics specialist did not take reasonable security measures to protect sensitive customer data. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
PC World
May 2003
Daniel Tynan
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. mark for My Articles similar articles
Global Services
June 1, 2008
Imrana Khan
Five Most Popular Outsourcing Risks As the practice of outsourcing matures, new risks emerge. Some call it next generation outsourcing risks. Let's take a look at the topic of managing risks in an outsourcing engagement. mark for My Articles similar articles
Bank Technology News
February 2002
Joseph McKendrick
Leave Computing to Us Outsourcing hits its stride in banking... mark for My Articles similar articles
CFO
February 1, 2003
Alix Nyberg
Will Outsourcing Still Fly? EDS's financial troubles have raised questions about outsourcing deals, but the answers are mostly upbeat. mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles