MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
March 18, 2005
Erin Joyce
Bruce Schneier, CTO, Counterpane Internet Security An interview covering the weakness of 2-factor authentication on the Internet, managed security services, software insecurity, and advice for lawmakers. mark for My Articles similar articles
InternetNews
March 3, 2006
Erin Joyce
Neal Creighton, CEO, GeoTrust Digital certificate authority Neal Creighton sees a busy year dawning. The co-founder of GeoTrust explains why. mark for My Articles similar articles
Wall Street & Technology
January 23, 2007
Greg MacSweeney
Web 2.0 and Data Privacy Will Define Financial Services in 2007, Says Steve Rapp, SVP; CIO, Nicholas Applegate. The move to further protect client data and the maturation of Web 2.0 related businesses are two topics that will define financial services in 2007. mark for My Articles similar articles
InternetNews
October 24, 2005
Tim Gray
Companies Bid for Authentication Compliance Work Financial institutions are getting started on security compliance regulations. mark for My Articles similar articles
InternetNews
December 7, 2005
Roy Mark
Consumers Whistling Past the Security Graveyard Less than 20 percent of American home computers are adequately protected against viruses, spyware, hackers and other security threats. Nevertheless, an overwhelming majority of users believe they are safe from an attack. mark for My Articles similar articles
InternetNews
June 16, 2004
Clint Boulton
ID Theft Costs Victims $2.4B in One Year New Gartner research says millions are duped by online fraudsters through scams such as phishing. mark for My Articles similar articles
Bank Systems & Technology
July 28, 2006
Gregg Keizer
Phishers Beat Citibank's Two-Factor Authentication Nearly three-dozen phishing Web sites have targeted Citibank business customers with a new scheme that circumvents two-factor authentication. mark for My Articles similar articles
The Motley Fool
October 21, 2004
Tom Taulli
Our Money, Our Lost Identities There are many threats to our pocketbooks in the online world. Entrust's plan to put a stop to it can have a big impact for e-commerce. The company posted revenues of $21.3 million, which was a 6% increase from the same period a year ago. mark for My Articles similar articles
Wall Street & Technology
April 27, 2005
Jim Middlemiss
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. mark for My Articles similar articles
Bank Systems & Technology
April 7, 2006
Peggy Bresnick Kendler
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. mark for My Articles similar articles
InternetNews
November 8, 2005
Clint Boulton
Liberty Needs to Know Who You Are The Liberty Alliance Project creates a group to help companies bring authentication into their folds. mark for My Articles similar articles
Bank Systems & Technology
May 1, 2006
Lisa Valentine
Collaboration Is Job One An interview with Financial Services Technology Consortium executive director Daniel Schutzer on fostering a more collaborative environment regarding technology in the financial services industry. mark for My Articles similar articles
Search Engine Watch
September 17, 2009
Justilien Gaspard
5 Essential Skills of In-House Link Marketers Link marketing requires a skill set that combines multiple disciplines. Not every link marketer will excel at all five of these skills, but the more proficient they are in each area, the more likely they will be to succeed. mark for My Articles similar articles
U.S. Banker
February 2005
Michael Sisk
A Phish Story Phishing attacks (in which thieves send mass e-mails supposedly from reputable businesses) are expected to more than double in 2005, and are spreading to small banks. mark for My Articles similar articles
Wall Street & Technology
January 24, 2006
Greg MacSweeney
Reg NMS: Hurry Up and Wait An interview with Joe Gawronski, COO at Rosenblatt Securities, on the possibility of a delay in the implementation of both Reg NMS and NYSE's planned hybrid exchange model. mark for My Articles similar articles
InternetNews
November 19, 2004
Chris Nerney
A Costly Identity Crisis If it seems to you that the phishing/spam problem has gotten worse lately, it (unfortunately) isn't your imagination. mark for My Articles similar articles
Bank Systems & Technology
November 1, 2005
Steven Marlin
Defending the New Frontier An interview with Matthew Speare, Chief Information Security Officer at M&T Bank on the greatest security threats to banks and what banks to do to fight back. mark for My Articles similar articles
PC World
November 2005
Security Resources on the Web Additional links to information and resources regarding online security issues. mark for My Articles similar articles
InternetNews
March 3, 2005
Roy Mark
New Senate Bill Looks to Hook Phishers The Anti-Phishing Act of 2005 targets both the e-mail bait and the Web site switch by entering two new crimes into the U.S. Code. mark for My Articles similar articles
InternetNews
February 13, 2006
Sean Michael Kerner
VeriSign's VIP Protects Sign-On IDs VeriSign Identity Protection, announced today, will offer users the promise of a single security device that will enable authentication on VIP-enabled Web sites. mark for My Articles similar articles
Bank Systems & Technology
March 29, 2006
Valentine & Ruckh
Supporting the Front Lines Patrick Ruckh, First Tennessee Bank's CTO, says that getting information to the employees who are directly in touch with customers is the No. 1 priority for First Tennessee's IT department. mark for My Articles similar articles
PC World
December 2004
Bob Tedeschi
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. mark for My Articles similar articles
InternetNews
June 22, 2004
Sean Michael Kerner
MasterCard Charges Phishers The credit card company does its part to combat phishing phenomenon. mark for My Articles similar articles
Bank Systems & Technology
December 1, 2005
Steven Marlin
Exploring a Small Bank's IT Tom Robertson, a former network engineer at Fiserv and now Charter Bank's senior vice president and manager of information technologies, discusses the ins and outs of IT for a smaller bank. mark for My Articles similar articles
InternetNews
February 25, 2005
Sean Michael Kerner
Phishing Attacks Jump 42 Percent An anti-phishing group says scam e-mails that seek users' personal information increased sharply last month. The types of attacks are also expanding. The United States had the most phishing sites, with China and South Korea placing second and third, respectively. mark for My Articles similar articles
Bank Technology News
April 2004
Karen Krebsbach
Goin' Phishing Growing e-mail attacks threaten banks' bottom lines mark for My Articles similar articles
CRM
June 1, 2005
Marshall Lager
Fear and Loathing in the Database A company's CRM system might make it vulnerable to hackers, but with risk comes opportunity. mark for My Articles similar articles
PC Magazine
July 11, 2007
Erik Rhey
Q&A: Secrets of the Call Center Guy Abby David, a technical support expert at Dell's call center in Hyderabad, India, discusses the ins and outs of helping Americans fix their computers. mark for My Articles similar articles
InternetNews
March 2, 2005
Sean Michael Kerner
ETrade Adopts RSA Authentication ETrade customers now have the option of protecting their accounts with two-factor security from RSA. mark for My Articles similar articles
InternetNews
July 16, 2004
Chris Nerney
Trolling For Anti-Phishing Laws President Bush just signed legislation to increase penalties against phishing and other identity theft-related cyber crimes. mark for My Articles similar articles
Bank Technology News
March 2007
Holly Sraeel
Protecting Data Online Is a Top Priority for Consumers Today, consumers recognize that fraud is no laughing matter. According to a study, 41% of respondents would decrease their use of online banking or switch institutions in the wake of a data breach. mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
Bank Systems & Technology
August 30, 2005
Maria Bruno-Britz
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. mark for My Articles similar articles
PC Magazine
November 30, 2004
Sharon Terdeman
AOL Beefs up Security AOL is offering its customers a new premium service -- a two-factor authentication system called PassCode. mark for My Articles similar articles
Information Today
February 14, 2005
Barbara Quint
Yahoo!'s New Y!Q Service Improves Conceptual Searching Y!Q combines the ease of post-Boolean search capabilities (relevance ranking, More Like This, automatic taxonomy checks, etc.) with the control that Boolean-style searching offered. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
InternetNews
May 7, 2004
Susan Kuchinskas
Q&A: Mozelle Thompson, FTC Commissioner A key public policy official discusses spam, RFID and the need to modernize the patent process. mark for My Articles similar articles
Wall Street & Technology
January 24, 2006
Greg MacSweeney
Yearning for the Long View An interview with IBM Institute for Business Value's executive director and a senior consultant on a new financial market report that shows while Wall Street may live by the quarterly earnings call, executives are starving for a long-term vision. mark for My Articles similar articles
BusinessWeek
May 23, 2005
The WellPoint CEO's "Simple Philosophy" Larry Glasscock, head of the $45-billion-a-year health-care insurer WellPoint, discusses his "very humble beginnings," lessons learned from his company's merger, and pressing issues in health care. mark for My Articles similar articles
Search Engine Watch
June 10, 2010
Garrett French
4 'Preciprocity' Templates for Content-Based Link Builders How to warm up your relationship with influential bloggers, experts, analysts, reporters, and other link prospects in your media space. mark for My Articles similar articles
InternetNews
March 25, 2005
Susan Kuchinskas
Phishing Attacks Jump 26% Phishers and pharmers up attacks, perhaps in response to decreased results. mark for My Articles similar articles
Search Engine Watch
February 26, 2011
Judith Lewis
Top 9 Ways of Being a Link Magnet Some are obvious, and some may surprise you... mark for My Articles similar articles
U.S. Banker
December 2005
Authentication: FFIEC Commands Two-Factor ID by 2006 The Federal Financial Institutions Examination Council issued guidance requiring multi-factor authentication for on-line banking customers by the end of 2006. mark for My Articles similar articles
IndustryWeek
December 16, 2009
Adrienne Selko
Larger Market Share Secret to Success in 2010 for Purolator Company is expecting double digit growth over 2009 mark for My Articles similar articles
BusinessWeek
March 15, 2004
EachNet: Bringing E-Commerce to China CEO Bo Shao says the huge online marketplace can be "life changing" for buyers and sellers outside the big cities mark for My Articles similar articles
InternetNews
January 20, 2006
Sean Michael Kerner
Alan Boehme, CIO, Juniper Networks How does a big networking company like Juniper Networks run its own network? mark for My Articles similar articles
BusinessWeek
February 16, 2004
Consulting, With A Research Twist IBM Research Director Paul Horn explains why Big Blue now has its reknowned researchers working hand-in-hand with its consultants. mark for My Articles similar articles
The Motley Fool
June 22, 2005
John Reeves
Fool by Numbers: Lindsay Manufacturing Q3 2005 The company released earnings today: Income Statement Highlights... Balance Sheet Highlights... Margin Checkup...Cash Flow Checkup... mark for My Articles similar articles