MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
U.S. Banker
March 2007
Paresh Amin
Balancing Industry Mandates and Federal Regulations Financial companies need to consider compliance, business objectives and data security in a holistic manner. All three can be boiled down to one main requirement: determining what is happening to critical data. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
InternetNews
April 4, 2008
Judy Mottl
HP Targets Storage With New Security Tools HP expands Secure Advantage Portfolio with new tools and free service. mark for My Articles similar articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. mark for My Articles similar articles
InternetNews
April 20, 2005
Drew Robb
Corporate Data Leaks Spur Interest in Storage Security High-profile data security breaches are boosting the fortunes of storage security vendors. Will national legislation follow? mark for My Articles similar articles
Wall Street & Technology
November 26, 2007
Melanie Rodier
Data Security: An Increasingly Daunting Task With breaches on the rise, consumer confidence waining, more data privacy regulations in the pipeline and a focus on outsourcing, financial services institutions must ensure they are protecting customer data -- both internally and externally. mark for My Articles similar articles
InternetNews
August 9, 2010
New Federal Data Breach Bill Debuts in Senate The new bill is getting early support from prominent Democrats and could require enterprises meet tighter security measures and new notification rules. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
Insurance & Technology
June 14, 2005
Wendy Toth
Securing Compliance: System, Project or Process? Database and application security products are growing in popularity as companies look for ways to keep up with regulatory demands like Sarbanes-Oxley. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
Wall Street & Technology
June 18, 2007
Melanie Rodier
US Businesses Still Lack Adequate Security to Protect Client Information Study shows 85% of midsize to large businesses spanning all industries reported data security breach, mostly due to stolen equipment. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
National Defense
June 2013
Pankowski & Mercer
Corporate Cybersecurity Plans Must Evolve Presidential pronouncements highlight the seriousness of cyberthreats. Companies need to develop response plans and develop a clear line of responsibility for notification of governmental authorities and the public. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2006
Gregg Keizer
Cleanup Costs Much More Than Encryption: Gartner Protecting customer records is much less expensive than paying for cleanup after a data breach or massive records loss, according to Stamford, Conn.-based Gartner. mark for My Articles similar articles
The Motley Fool
March 10, 2011
Anders Bylund
Why NetApp Wants What LSI Is Selling A look at both sides of the NetApp/LSI deal. mark for My Articles similar articles
InternetNews
April 28, 2010
Data Breaches Dent U.S. Corporate Coffers Regulations requiring U.S. companies to notify customers when their data has been compromised is taking its toll on corporate bottom lines. mark for My Articles similar articles
CIO
March 9, 2012
Stephanie Overby
IT Service Providers and Customers Battle Over Data Breaches IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud. mark for My Articles similar articles
InternetNews
May 10, 2011
NetApp Wraps Up Engenio Deal The storage vendor reports it has completed its purchase of LSI Corp.'s Engenio line of external storage systems products for $480 million in cash. mark for My Articles similar articles
InternetNews
June 11, 2010
Feds Reassessing Breach Notification Laws Data breaches small and large continue to plague consumers and businesses at a record pace and lawmakers at all levels of government are now considering more proactive legislation to help thwart identity theft. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
InternetNews
November 12, 2010
No Quick Fix for Storage Management Woes Obstacles perpetuate storage management's unwieldy status. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
InternetNews
January 21, 2009
Richard Adhikari
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. mark for My Articles similar articles
InternetNews
March 17, 2006
Roy Mark
Groups Slam Data Breach Notification Bill A U.S. House panel effort to write a national data breach disclosure law is running into fierce opposition by consumer groups calling the legislation the "worst data security bill ever." mark for My Articles similar articles
InternetNews
June 17, 2011
NetApp Adds New Cloud Features to OnCommand NetApp beefs up its OnCommand management software for cloud control. mark for My Articles similar articles
InternetNews
November 9, 2005
Paul Shread
Storage Security Market Heats Up The storage security market has been heating up as of late, spurred by high-profile data breaches and growing congressional interest in the issue. mark for My Articles similar articles
HRO Today
Mar/Apr 2008
Kerry Ann Vales
Compliance Outsourcing Gaining New Ground in HRO Contracts In a world of changing regulations, employers are increasingly looking to service providers to help ensure they meet all applicable mandates. Expect more contracts, especially mid-market ones, to tack on compliance as part of the service delivery. mark for My Articles similar articles
Insurance & Technology
June 16, 2004
Julie Gallagher
Look On the Bright Side Rather than letting the clouds of regulation rain on their operations, insurers that look for compliance's silver lining have an opportunity to improve their business processes. mark for My Articles similar articles
Wall Street & Technology
November 21, 2006
Cory Levine
Inefficient Efforts: Firms Look to Break Down Their Isolated Compliance Processes Industry solution providers are coming up with new ways to unify compliance efforts across the organization, bringing efficiencies and benefits to the business from widely maligned regulatory mandates. mark for My Articles similar articles
InternetNews
January 26, 2010
Average Cost of Data Breach $6.75m in 2009 New study from Ponemon Institute and PGP Corp. shows rising costs for businesses associated with data breaches. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
CIO
August 27, 2010
Stephen Lawson
Cloud Storage: How it Helps Companies Expand Globally Cloud storage can help companies get operations up and running quickly in a new location. mark for My Articles similar articles
CIO
May 12, 2011
Stephen Lawson
Joining the Unified Storage Crowd EMC is catching up as it adapts its product line to support unified storage. Can it maintain its influence? mark for My Articles similar articles
InternetNews
March 9, 2011
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Jack Milligan
Knee Deep in Regulation As part of the fallout from the latest financial crisis, bankers are wading through new layers of regulation while scanning for clearer skies ahead. mark for My Articles similar articles
InternetNews
September 23, 2005
Sean Michael Kerner
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. mark for My Articles similar articles
InternetNews
February 9, 2007
Roy Mark
When Is a Breach a Breach? If you think there's hope for a national data breach notification law, consider this: Congress can't decide what a breach is. Really. mark for My Articles similar articles
InternetNews
May 16, 2007
Paul Shread
Cisco Plans Storage Security Push Cisco Systems will ship a fabric-based encryption offering for disk and tape later this year that the company says bests current approaches. mark for My Articles similar articles
InternetNews
June 16, 2005
Clint Boulton
NetApp Shores up Encryption Angle Network Appliance will sell newly acquired Decru's storage security products alongside its own, but will not incorporate Decru's technology into its existing product line. mark for My Articles similar articles
Bank Technology News
March 2009
Rebecca Sausner
Heartland's Lonely Quest For Reform Heartland Payment Systems deals with perhaps the largest data breach ever. mark for My Articles similar articles
T.H.E. Journal
September 1, 2010
John K. Waters
Move It or Lose: It Cloud-Based Data Storage In Hendrick Hudson School District, located in Montrose, NY, just 40 minutes outside the Big Apple, district auditors wanted a better way to back up their data than the on-site, tape-based system the district had been using for years. mark for My Articles similar articles
InternetNews
August 25, 2009
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. mark for My Articles similar articles
Wall Street & Technology
March 1, 2004
Getting Management on Board With Compliance Compliance and litigation readiness have blasted up the priority list of top management. Leading financial institutions have appointed general counsel into top management roles. Boards of directors are reviewing and approving technology solutions. mark for My Articles similar articles
InternetNews
November 28, 2007
Andy Patrizio
Report Details Real Costs of Data Breaches Some experts say breaches aren't just an embarrassment to your IT department: They're a leech on the bottom line. mark for My Articles similar articles
Investment Advisor
February 2007
Kara Stapleton
Small Caps On Top Again The small-cap Russell 2000 Index made a comeback in 2006. mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
PC Magazine
July 10, 2003
Sebastian Rupley
California's Two-Fisted Privacy Stance A new state identity-theft law actually extends far beyond the state. mark for My Articles similar articles
CRM
September 7, 2012
Dale Dabbs
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. mark for My Articles similar articles