MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
Bank Systems & Technology
December 14, 2005
Ivan Schneider
Cheating on the ID Challenge Here is how this consumer received his free, annual credit reports from Equifax, Experian and TransUnion -- and how he found the need for an identity cheat sheet along the way. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
Entrepreneur
June 2007
Amanda C. Kooser
Safety First Keep your customer and employee data on lock-down. mark for My Articles similar articles
The Motley Fool
March 29, 2006
Rich Smith
Equifax Gets Some Competition Credit-checker Experian is currently part of the U.K.-based retail and financial services conglomerate GU.S. Plc. GUS has decided to split itself in two sometime within the next year, spinning off Experian as one independent public company, and Argos Retail as another. Investors, take note. mark for My Articles similar articles
InternetNews
February 2, 2007
Roy Mark
Congress, White House Dinged on Cyber Security Lawmakers' inability to pass legislation and the administration's lack of leadership earn D's in annual report card from CSIA. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
The Motley Fool
January 20, 2005
Dayana Yochim
Who Has the Keys to Your Credit File? Anyone with a "permissible purpose" can peruse your credit history. Do your own sleuthing and see who has been inquiring about your credit history. mark for My Articles similar articles
InternetNews
February 9, 2007
Roy Mark
When Is a Breach a Breach? If you think there's hope for a national data breach notification law, consider this: Congress can't decide what a breach is. Really. mark for My Articles similar articles
Wall Street & Technology
June 18, 2007
Melanie Rodier
US Businesses Still Lack Adequate Security to Protect Client Information Study shows 85% of midsize to large businesses spanning all industries reported data security breach, mostly due to stolen equipment. mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
PC World
September 2003
Lincoln Spector
.Zip File Format Splinters Top compression utilities may not read each other's files. mark for My Articles similar articles
InternetNews
March 12, 2007
Andy Patrizio
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Patricia Brown
Equifax's Big Spend on Security Aside from assigning credit scores for individuals, another core part of Equifax's business is to keep sensitive information secure. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
Entrepreneur
November 2004
Amanda C. Kooser
The I's Have It A more secure wireless standard is on its way and major manufacturers are expected to implement the new standard with a focus on business hardware first. mark for My Articles similar articles
The Motley Fool
June 30, 2007
Elizabeth Brokamp
Monitor Your Own Credit Don't want pay a credit monitoring service? Do it yourself. To obtain a free copy of your credit report, you have three options. mark for My Articles similar articles
Fast Company
Pavithra Mohan
Hackers Compromise T-Mobile Customer Data, Steal 15 Million Records In the past year, a staggering number of high-profile hacks have been carried out against various companies and organizations, including a large-scale attack that leaked the personal information of 22 million government employees. mark for My Articles similar articles
Bank Systems & Technology
June 30, 2009
Nathan Conz
Heartland Completes First Phase of Encryption Pilot Heartland Payment Systems announces it has successfully completed an AES-encrypted transaction process from a merchant card reader through to a processor network. mark for My Articles similar articles
InternetNews
September 12, 2006
Sean Michael Kerner
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
InternetNews
November 9, 2005
Paul Shread
Storage Security Market Heats Up The storage security market has been heating up as of late, spurred by high-profile data breaches and growing congressional interest in the issue. mark for My Articles similar articles
InternetNews
August 27, 2009
First WEP, Now WPA Encryption Falls Japanese researchers to show how WPA can be broken as easily as WEP, in under a minute. mark for My Articles similar articles
The Motley Fool
August 30, 2005
Dayana Yochim
Your Credit Score's All Wrong The author reveals the kinks in the consumer credit scoring system and explains why the credit file you're allowed to see isn't the same one your banker uses. mark for My Articles similar articles
The Motley Fool
June 13, 2006
Tim Beyers
ID Theft: When Will It End? This time, the Energy Department blows it. So what should have happened? Here's what to do if you think your ID has been compromised. mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
PC Magazine
April 30, 2009
Nicole Price Fasig
Give Your Data a Safe Trip These secure hard drives will keep your files from falling into the wrong hands on the road. mark for My Articles similar articles
The Motley Fool
June 20, 2006
Dayana Yochim
Fake Credit Scores for Sale You might be surprised how label-conscious your lender really is. No matter what the scoring scale, all of these systems are designed to achieve one goal -- to see how risky it is to do business with you based on your past behavior. mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
InternetNews
June 1, 2009
Alex Goldman
What Enterprises Can Learn from the RAF Breach The latest security snafu from across the pond provides lessons both on what not to do with sensitive data and what you should do after things go wrong. mark for My Articles similar articles
Entrepreneur
September 2005
Scott Bernard Nelson
Reporting In Federal law now allows you to check your credit reports for free every year. Here's how to access them -- and protect your credit rating. mark for My Articles similar articles
CIO
October 12, 2009
Kim S. Nash
Cloud Computing: How TransUnion Makes Money from Its Private Cloud Credit reporting giant TransUnion replaced custom-developed services with cloud computer capabilities for its customers. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2006
Gregg Keizer
Cleanup Costs Much More Than Encryption: Gartner Protecting customer records is much less expensive than paying for cleanup after a data breach or massive records loss, according to Stamford, Conn.-based Gartner. mark for My Articles similar articles
InternetNews
September 24, 2008
Paul Shread
Can Storage Fabrics Offer Security? Security is becoming an increasingly important part of storage fabrics, judging by recent announcements from Cisco and Brocade. mark for My Articles similar articles
InternetNews
April 4, 2008
Judy Mottl
HP Targets Storage With New Security Tools HP expands Secure Advantage Portfolio with new tools and free service. mark for My Articles similar articles
PC Magazine
August 31, 2005
Ryan Naraine
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications. mark for My Articles similar articles
CIO
May 15, 2012
Kim S. Nash
Experian Has Sophisticated Presence on Facebook Credit bureau engages chatty customers on the top social network, but says it doesn't mine the data for marketing purposes. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
1) Heartland Payment Systems Heartland Payment System's E3, an end-to-(almost) end encryption process, has the greatest potential of any new product to impact the security of America's financial system in the coming year. mark for My Articles similar articles
PC Magazine
August 22, 2008
Matthew D. Sarrel
Thwarting Identity Theft Identity theft has been a federal offense since 1998. But are we getting any better at dealing with it? Actually, we are. Here are several tips to prevent financial loss from identity theft. mark for My Articles similar articles
InternetNews
June 11, 2010
Feds Reassessing Breach Notification Laws Data breaches small and large continue to plague consumers and businesses at a record pace and lawmakers at all levels of government are now considering more proactive legislation to help thwart identity theft. mark for My Articles similar articles