Similar Articles |
|
U.S. Banker March 2007 Paresh Amin |
Balancing Industry Mandates and Federal Regulations Financial companies need to consider compliance, business objectives and data security in a holistic manner. All three can be boiled down to one main requirement: determining what is happening to critical data. |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. |
InternetNews April 4, 2008 Judy Mottl |
HP Targets Storage With New Security Tools HP expands Secure Advantage Portfolio with new tools and free service. |
InternetNews July 13, 2009 |
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. |
Wall Street & Technology October 23, 2007 Melanie Rodier |
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. |
InternetNews April 20, 2005 Drew Robb |
Corporate Data Leaks Spur Interest in Storage Security High-profile data security breaches are boosting the fortunes of storage security vendors. Will national legislation follow? |
Wall Street & Technology November 26, 2007 Melanie Rodier |
Data Security: An Increasingly Daunting Task With breaches on the rise, consumer confidence waining, more data privacy regulations in the pipeline and a focus on outsourcing, financial services institutions must ensure they are protecting customer data -- both internally and externally. |
InternetNews August 9, 2010 |
New Federal Data Breach Bill Debuts in Senate The new bill is getting early support from prominent Democrats and could require enterprises meet tighter security measures and new notification rules. |
InternetNews October 28, 2008 Richard Adhikari |
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
Insurance & Technology June 14, 2005 Wendy Toth |
Securing Compliance: System, Project or Process? Database and application security products are growing in popularity as companies look for ways to keep up with regulatory demands like Sarbanes-Oxley. |
CRM March 2, 2012 Raul Ortega |
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. |
Wall Street & Technology June 18, 2007 Melanie Rodier |
US Businesses Still Lack Adequate Security to Protect Client Information Study shows 85% of midsize to large businesses spanning all industries reported data security breach, mostly due to stolen equipment. |
InternetNews November 17, 2010 |
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. |
National Defense June 2013 Pankowski & Mercer |
Corporate Cybersecurity Plans Must Evolve Presidential pronouncements highlight the seriousness of cyberthreats. Companies need to develop response plans and develop a clear line of responsibility for notification of governmental authorities and the public. |
Bank Systems & Technology June 26, 2006 Gregg Keizer |
Cleanup Costs Much More Than Encryption: Gartner Protecting customer records is much less expensive than paying for cleanup after a data breach or massive records loss, according to Stamford, Conn.-based Gartner. |
The Motley Fool March 10, 2011 Anders Bylund |
Why NetApp Wants What LSI Is Selling A look at both sides of the NetApp/LSI deal. |
InternetNews April 28, 2010 |
Data Breaches Dent U.S. Corporate Coffers Regulations requiring U.S. companies to notify customers when their data has been compromised is taking its toll on corporate bottom lines. |
CIO March 9, 2012 Stephanie Overby |
IT Service Providers and Customers Battle Over Data Breaches IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud. |
InternetNews May 10, 2011 |
NetApp Wraps Up Engenio Deal The storage vendor reports it has completed its purchase of LSI Corp.'s Engenio line of external storage systems products for $480 million in cash. |
InternetNews June 11, 2010 |
Feds Reassessing Breach Notification Laws Data breaches small and large continue to plague consumers and businesses at a record pace and lawmakers at all levels of government are now considering more proactive legislation to help thwart identity theft. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
InternetNews November 12, 2010 |
No Quick Fix for Storage Management Woes Obstacles perpetuate storage management's unwieldy status. |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
InternetNews January 21, 2009 Richard Adhikari |
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. |
InternetNews March 17, 2006 Roy Mark |
Groups Slam Data Breach Notification Bill A U.S. House panel effort to write a national data breach disclosure law is running into fierce opposition by consumer groups calling the legislation the "worst data security bill ever." |
InternetNews June 17, 2011 |
NetApp Adds New Cloud Features to OnCommand NetApp beefs up its OnCommand management software for cloud control. |
InternetNews November 9, 2005 Paul Shread |
Storage Security Market Heats Up The storage security market has been heating up as of late, spurred by high-profile data breaches and growing congressional interest in the issue. |
HRO Today Mar/Apr 2008 Kerry Ann Vales |
Compliance Outsourcing Gaining New Ground in HRO Contracts In a world of changing regulations, employers are increasingly looking to service providers to help ensure they meet all applicable mandates. Expect more contracts, especially mid-market ones, to tack on compliance as part of the service delivery. |
Insurance & Technology June 16, 2004 Julie Gallagher |
Look On the Bright Side Rather than letting the clouds of regulation rain on their operations, insurers that look for compliance's silver lining have an opportunity to improve their business processes. |
Wall Street & Technology November 21, 2006 Cory Levine |
Inefficient Efforts: Firms Look to Break Down Their Isolated Compliance Processes Industry solution providers are coming up with new ways to unify compliance efforts across the organization, bringing efficiencies and benefits to the business from widely maligned regulatory mandates. |
InternetNews January 26, 2010 |
Average Cost of Data Breach $6.75m in 2009 New study from Ponemon Institute and PGP Corp. shows rising costs for businesses associated with data breaches. |
InternetNews February 20, 2009 Jennifer Schiff |
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. |
CIO August 27, 2010 Stephen Lawson |
Cloud Storage: How it Helps Companies Expand Globally Cloud storage can help companies get operations up and running quickly in a new location. |
CIO May 12, 2011 Stephen Lawson |
Joining the Unified Storage Crowd EMC is catching up as it adapts its product line to support unified storage. Can it maintain its influence? |
InternetNews March 9, 2011 |
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow. |
Bank Director 2nd Quarter 2010 Jack Milligan |
Knee Deep in Regulation As part of the fallout from the latest financial crisis, bankers are wading through new layers of regulation while scanning for clearer skies ahead. |
InternetNews September 23, 2005 Sean Michael Kerner |
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. |
InternetNews February 9, 2007 Roy Mark |
When Is a Breach a Breach? If you think there's hope for a national data breach notification law, consider this: Congress can't decide what a breach is. Really. |
InternetNews May 16, 2007 Paul Shread |
Cisco Plans Storage Security Push Cisco Systems will ship a fabric-based encryption offering for disk and tape later this year that the company says bests current approaches. |
InternetNews June 16, 2005 Clint Boulton |
NetApp Shores up Encryption Angle Network Appliance will sell newly acquired Decru's storage security products alongside its own, but will not incorporate Decru's technology into its existing product line. |
Bank Technology News March 2009 Rebecca Sausner |
Heartland's Lonely Quest For Reform Heartland Payment Systems deals with perhaps the largest data breach ever. |
T.H.E. Journal September 1, 2010 John K. Waters |
Move It or Lose: It Cloud-Based Data Storage In Hendrick Hudson School District, located in Montrose, NY, just 40 minutes outside the Big Apple, district auditors wanted a better way to back up their data than the on-site, tape-based system the district had been using for years. |
InternetNews August 25, 2009 |
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. |
Wall Street & Technology March 1, 2004 |
Getting Management on Board With Compliance Compliance and litigation readiness have blasted up the priority list of top management. Leading financial institutions have appointed general counsel into top management roles. Boards of directors are reviewing and approving technology solutions. |
InternetNews November 28, 2007 Andy Patrizio |
Report Details Real Costs of Data Breaches Some experts say breaches aren't just an embarrassment to your IT department: They're a leech on the bottom line. |
Investment Advisor February 2007 Kara Stapleton |
Small Caps On Top Again The small-cap Russell 2000 Index made a comeback in 2006. |
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
PC Magazine July 10, 2003 Sebastian Rupley |
California's Two-Fisted Privacy Stance A new state identity-theft law actually extends far beyond the state. |
CRM September 7, 2012 Dale Dabbs |
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. |