MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
July 26, 2004
Colin C. Haley
eEye Stares Down Security Threats The Blink security software helps companies safeguard against known and unknown network threats... early interest will likely come from financial services and the government. mark for My Articles similar articles
InternetNews
July 7, 2004
Colin C. Haley
nCircle the Security Wagons The network security upstart upgrades its product and is about to partner with industry giant Cisco. mark for My Articles similar articles
InternetNews
August 16, 2004
Ryan Naraine
McAfee Deepens Security Reach The company buys into risk-management arena with Foundstone acquisition. mark for My Articles similar articles
InternetNews
October 31, 2005
Jim Wagner
McAfee Strengthens Foundstone Arm McAfee is adding regulatory compliance safeguards and a new remote management appliance to its Foundstone line of products. mark for My Articles similar articles
InternetNews
February 26, 2004
Michael Singer
The Net Has An 'Insecurity' Complex RSA's second annual assessment of online security leaves little doubt that corporations have a long way to go. mark for My Articles similar articles
InternetNews
March 9, 2004
Colin C. Haley
Cisco's Bundle of Virus-Fighters The company combines enterprise security tools and network infrastructure in a quest to develop a 'self-defending network.' mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
InternetNews
January 14, 2010
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. mark for My Articles similar articles
InternetNews
November 1, 2004
Colin C. Haley
AT&T Builds In Network Security AT&T announced a new version of its predictive service designed to help protect far-flung businesses from worms and viruses without deploying firewalls at each location. mark for My Articles similar articles
InternetNews
October 3, 2006
Andy Patrizio
McAfee Reaches For Citadel Security Software McAfee on Tuesday announced it will acquire substantially all of the assets of Citadel Security Software for approximately $56 million in cash, plus an estimated $4 million in working capital reimbursement. mark for My Articles similar articles
InternetNews
November 14, 2005
Colin C. Haley
Juniper's Funk Buy Network equipment maker Juniper pays $122M for security specialist Funk Software. mark for My Articles similar articles
InternetNews
October 19, 2007
Sean Michael Kerner
Report: Carriers Need to Heed Security Network carriers are more than just highways for packets; they need to be cops, too. mark for My Articles similar articles
InternetNews
July 28, 2010
Cisco Warns on Enterprise Security Threats In its latest quarterly Global Threat Report, networking giant Cisco outlines a broad-ranging list of threats to enterprise security culled from its various security products. mark for My Articles similar articles
InternetNews
August 11, 2010
Want to Keep Hackers Out? Avoid 'Security Theater' Roger Johnston, a vulnerability assessment expert at the U.S. Dept. of Energy's Argonne National Laboratory, discusses the missing element in many enterprises' security postures. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
InternetNews
April 21, 2005
Tim Gray
HIPAA Deadline Passes Health care organizations still working to comply with privacy and security technology provisions of HIPAA. mark for My Articles similar articles
PC Magazine
February 26, 2007
Robert P. Lipschutz
Perimeter eSecurity Vulnerability Assessment Taking a simple step can reveal holes in your small business's network. mark for My Articles similar articles
U.S. Banker
March 2007
Paresh Amin
Balancing Industry Mandates and Federal Regulations Financial companies need to consider compliance, business objectives and data security in a holistic manner. All three can be boiled down to one main requirement: determining what is happening to critical data. mark for My Articles similar articles
Bank Systems & Technology
July 22, 2007
Nancy Feig
Bank's IT Security Vulnerability Growing Improvements in overall security have been achieved in most industry sectors, but the financial services industry has seen an increase in the average number of IT vulnerabilities, according to to a study. mark for My Articles similar articles
InternetNews
November 10, 2004
Jim Wagner
Security Vendors Stumping For Certification Saying companies like Cisco, Symantec and McAfee are making claims they can't back up, four vendors ask them to prove it through certification. mark for My Articles similar articles
InternetNews
February 15, 2007
Andy Patrizio
Another Week, Another MS Word Exploit Emerges Microsoft is investigating new public reports of "very limited, targeted attacks" against Microsoft Word. mark for My Articles similar articles
The Motley Fool
October 6, 2006
Tom Taulli
McAfee Secures Another Smart Deal After another savvy acquisition, one problem still remains: Microsoft. McAfee shareholders, be warned. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
InternetNews
June 28, 2004
Colin C. Haley
Juniper Serious About SAML The gear maker intros access appliances that are interoperable with the Security Assertion Markup Language, a specification for sharing authorization data between different security systems. mark for My Articles similar articles
PC Magazine
March 1, 2006
Matthew D. Sarrel
Hack Thyself Discovering security flaws is the first step toward getting your small business's computers in shape. mark for My Articles similar articles
InternetNews
May 30, 2006
Roy Mark
Symantec Patches Antivirus Vulnerability Symantec said today it has fixed a vulnerability in its antivirus software suite that potentially could open a backdoor to hackers. mark for My Articles similar articles
InternetNews
March 30, 2004
Ryan Naraine
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. mark for My Articles similar articles
InternetNews
May 26, 2006
Ed Sutherland
Symantec Denies 'Highly Severe' Antivirus Flaw Could Symantec's antivirus software, which guards company and government computers, include a backdoor allowing hackers access to corporate data? mark for My Articles similar articles
InternetNews
August 16, 2004
Colin C. Haley
Juniper Jumps into SMB Security Juniper uses technology it acquired through purchase of NetScreen in February to develop affordable, easy-to-install SSL VPN appliances. mark for My Articles similar articles
InternetNews
January 10, 2005
Tim Gray
McAfee Combats Human Error McAfee has released an updated version of its security tool, which uses Google to identify important information accidentally exposed on the Web. mark for My Articles similar articles
InternetNews
June 6, 2006
Andy Patrizio
McAfee Snags Preventsys, Releases Falcon McAfee today announced four new security service suites as part of the Falcon family of products, which provides a more user-friendly interface to McAfee's product line, plus a subscription model. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
InternetNews
November 23, 2004
Tim Gray
Analysts: Expect More Ad Server Attacks Security analysts say attacks via ad servers are likely to continue. Another reason not to use Internet Explorer? mark for My Articles similar articles
InternetNews
October 21, 2004
Colin C. Haley
Cisco Buy Blurs Networking and Security Lines In a move further underlining the convergence of networking and security, Cisco said it will buy Perfigo for $74 million in cash. mark for My Articles similar articles
InternetNews
September 28, 2009
McAfee, Adobe Partner on Enterprise Security Software leaders team up on security for intellectual property and regulatory compliance data. mark for My Articles similar articles
InternetNews
December 31, 2010
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. mark for My Articles similar articles
InternetNews
January 29, 2007
Michael Hickins
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. mark for My Articles similar articles
CIO
October 15, 2003
Paul Roberts
Virus Attacks What a month. Human frailty, spam and a dangerous Microsoft Windows vulnerability combined to produce four major Internet worm attacks in August. A rundown. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
April 20, 2004
Ryan Naraine
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. mark for My Articles similar articles
InternetNews
January 5, 2005
Sean Michael Kerner
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. mark for My Articles similar articles
InternetNews
September 8, 2005
Tim Gray
McAfee Breaks Into Pipe Cleaning The company's Clean Pipes initiative helps will help ISPs protect their customers with a package of managed security services. mark for My Articles similar articles
InternetNews
August 6, 2010
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. mark for My Articles similar articles
InternetNews
September 15, 2006
Ed Sutherland
Hackers Attack ActiveX Flaw in IE IE 5.01 and 6 users warned to disable ActiveX while the Microsoft investigates. mark for My Articles similar articles