Similar Articles |
|
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
CFO April 1, 2008 Scott Leibs |
Firewall of Silence Data security breaches are rampant, and costly. So why don't C-level executives talk about them? |
PC World February 3, 2003 Paul Roberts |
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. |
IEEE Spectrum May 2005 Riordan, Wespi & Zamboni |
How to Hook Worms Because a computer network cannot ward off every last Internet worm, it must sound an alarm the minute one slithers inside. |
CFO November 17, 2003 Joseph C. Panettieri |
Security It's a classic technology dilemma: businesses know they must protect their computers from devoted hackers and disgruntled employees, but how much is too much? More computers equals more vulnerability, and more spending. |
CFO January 1, 2006 John McPartlin |
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? |
CIO March 9, 2012 Stephanie Overby |
IT Service Providers and Customers Battle Over Data Breaches IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud. |
CIO November 1, 2001 Sarah D. Scalet |
See You in Court Inadequate security leaves companies open not just to hackers but to lawsuits. Realize why lawsuits over failed information security are imminent. Determine how your company may be liable for damage caused by hackers. Learn how to prepare and respond... |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
CFO September 1, 2002 Scott Leibs |
Lesson from 9/11: It's Not about Data A year after 9/11, are businesses prepared for any contingency? |
Entrepreneur November 2003 Jane Easter Bahls |
This Means War Put up your best fight to protect your network, or you could be held liable for damages to customers. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
CFO November 17, 2003 Polly Schneider Traylor |
Outsourcing More work is being sent packing, often far away. To make it pay off, management must adapt. |
InternetNews November 16, 2006 Roy Mark |
Guidance Software Settles With FTC Guidance Software agreed Thursday to settle Federal Trade Commission charges that the computer forensics specialist did not take reasonable security measures to protect sensitive customer data. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
PC World May 2003 Daniel Tynan |
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. |
Global Services June 1, 2008 Imrana Khan |
Five Most Popular Outsourcing Risks As the practice of outsourcing matures, new risks emerge. Some call it next generation outsourcing risks. Let's take a look at the topic of managing risks in an outsourcing engagement. |
Bank Technology News February 2002 Joseph McKendrick |
Leave Computing to Us Outsourcing hits its stride in banking... |
CFO February 1, 2003 Alix Nyberg |
Will Outsourcing Still Fly? EDS's financial troubles have raised questions about outsourcing deals, but the answers are mostly upbeat. |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. |
CIO November 1, 2003 Scott Berinato |
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? |