MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 5, 2008
Richard Adhikari
More Illegal Peeks at Obama's Records For the second time in recent months, President-elect Barack Obama's records were illegally accessed by employees of the organization responsible for maintaining them. mark for My Articles similar articles
InternetNews
November 25, 2008
Richard Adhikari
Verizon Staff Fired After Peek at Obama's Calls The Verizon Wireless employees who accessed President-elect Barack Obama's records without authorization have been fired, according to news reports. mark for My Articles similar articles
InternetNews
April 24, 2009
Alex Goldman
Lockheed Martin, DoD Under Constant Net Attack Lockheed Martin responds to reports that data on its flagship jet fighter was stolen from Department of Defense computers. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Does the State Dept. Ignore Security? UPDATED: Reports suggest an ongoing pattern of unauthorized access to citizens' personal information. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Verizon Business Launches App Security Service Verizon Business is implementing lessons learned from its data breach report, designed to help business fix key security risks. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
Pentagon Claims $100M in Cybersecurity Costs The threat is real, but so is the fight for budget financing in Washington. mark for My Articles similar articles
Wall Street & Technology
August 22, 2007
Nancy Feig
USB Flash Drives Represent Top Threat To Corporate Security A new study reveals that more than 43% of companies have no controls in place to manage removable media devices and 27.4% leave it to the manager's discretion. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
Popular Mechanics
August 25, 2008
Obama, McCain Scout High-Tech Homeland Revamp Here is a breakdown of each candidate's positions on homeland security. mark for My Articles similar articles
InternetNews
July 10, 2009
Alex Goldman
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access. mark for My Articles similar articles
InternetNews
July 6, 2006
Sean Michael Kerner
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
InternetNews
March 9, 2011
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow. mark for My Articles similar articles
InternetNews
April 21, 2011
Stuart J. Johnston
Report: Data Breaches on the Decline. New report from Verizon shows a positive trend, but that doesn't mean that the battle is over. mark for My Articles similar articles
InternetNews
December 12, 2008
Richard Adhikari
SaaS, Green Tech in Top 2009 IT Growth Areas It's all about doing more with less in order to survive, according to a new report by Verizon. mark for My Articles similar articles
InternetNews
February 10, 2009
Kenneth Corbin
Obama Calls for Cybersecurity Review After a string of breaches and data leaks, president orders two-month interagency review to shore up computing infrastructure. mark for My Articles similar articles
InternetNews
September 20, 2010
Verizon Names McAdam CEO-in-Waiting Verizon Communications clarifies its succession plans by elevating Lowell McAdam from CEO of wireless subsidiary to president and COO of the telecom giant. mark for My Articles similar articles
IEEE Spectrum
August 2008
Prachi Patel-Predd
Data Theft by Partner Companies on the Rise Data breaches involving trusted third parties -- business partners, vendors, suppliers, and contractors -- are alarmingly on the rise, according to a recent investigation by the security team at Verizon Business. mark for My Articles similar articles
InternetNews
August 9, 2010
New Federal Data Breach Bill Debuts in Senate The new bill is getting early support from prominent Democrats and could require enterprises meet tighter security measures and new notification rules. mark for My Articles similar articles
InternetNews
July 15, 2009
Verizon Says App Plan Won't Hurt Phone Makers Verizon Wireless defends its policy over its upcoming app store. mark for My Articles similar articles
Military & Aerospace Electronics
March 2008
John Keller
2009 DOD budget: A Safe Bet We'll have a new president by the time the next DOD budget request comes out, and Bush looks like he has left any hard decisions up to the next chief executive. mark for My Articles similar articles
InternetNews
February 22, 2007
Roy Mark
Retailers to Hold Data-Breach Bag? Proposed legislation in Massachusetts would make retailers financially responsible for breaches of their databases that lead to consumer identity theft. mark for My Articles similar articles
InternetNews
December 5, 2008
Richard Adhikari
Cyber Threats Await Next Homeland Security Chief How might Obama's appointment to head the DHS turn things around for the department? Experts weigh in. mark for My Articles similar articles
InternetNews
August 25, 2009
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. mark for My Articles similar articles
Military & Aerospace Electronics
December 2009
Courtney E. Howard
Portable Flash Drives Likely to Return to the Battlefield Officials in the U.S. Department of Defense (DOD) are considering lifting the year-long ban on removable data storage devices in military environments. mark for My Articles similar articles
InternetNews
August 25, 2006
Michael Hickins
Education Department Flunks on Security The Department of Education suffered an embarrassing breach over the past weekend when a site used to reimburse student loans allowed unauthorized access to the personal data of tens of thousands of registered users. mark for My Articles similar articles
InternetNews
December 5, 2007
David Needle
Is Android in Verizon Wireless's Future? Verizon makes noises in support of Google's Open Handset Alliance. mark for My Articles similar articles
InternetNews
November 5, 2008
Richard Adhikari
Spammers Latch on to Obama Victory President-elect Barack Obama's campaign leveraged social networking all the way to victory in last night's election. But Obama's online presence has attracted some problems, too. mark for My Articles similar articles
HBS Working Knowledge
October 20, 2003
Wendy Guild Swearingen
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A mark for My Articles similar articles
CRM
September 7, 2012
Dale Dabbs
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. mark for My Articles similar articles
InternetNews
August 4, 2006
Roy Mark
Data Breaches And Congress A roundup of where federal data breach security laws stand. mark for My Articles similar articles
InternetNews
April 5, 2011
Epsilon Data Breach Exposes Customer Emails Another high-profile data breach has occurred that could expose users to risk - what should you do to protect yourself? mark for My Articles similar articles
CFO
March 1, 2009
Bob Violino
As the Economy Sinks, Data Breaches Rise Many companies still fail to address rudimentary security issues. Despite budget pressures, they can't afford to ignore them much longer. mark for My Articles similar articles
InternetNews
August 30, 2004
Colin C. Haley
Verizon Wireless Expands to Circuit City The mobile carrier plans retail expansion inside 570 Circuit City stores. mark for My Articles similar articles
CIO
June 26, 2009
Kim S. Nash
Obama's Cybersecurity Push: What It Means for CIOs President Obama aims to fix U.S. cybersecurity, but can the feds hit a moving target? Not without private sector support and practical solutions. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties. mark for My Articles similar articles
InternetNews
May 24, 2006
Roy Mark
House Panel Moves on Data Breach Bill With data breaches back in the news, national legislation begins to percolate. mark for My Articles similar articles
InternetNews
June 18, 2009
Alex Goldman
The Offline Vulnerability of Personal Data Organizations cannot substitute technology for common sense in the handling of personal information, warns a new report. mark for My Articles similar articles
InternetNews
November 10, 2008
Kenneth Corbin
Google CEO Says 'No Thanks' to Obama CTO Job Obama adviser Eric Schmidt takes his name off the list for government tech czar. Who's left? mark for My Articles similar articles
CFO
October 1, 2004
Kris Frieswick
Losing Battles Two decades of failed Pentagon financial reforms put more than just dollars at risk. And serious reform in so enormous an organization will still take a Herculean effort. mark for My Articles similar articles
Search Engine Watch
November 17, 2008
Erik Qualman
President 2.0 Barack Obama was helped into the White House by the increasing popularity of social media. His appeal to younger audiences, and need to get exposure in a primary race against an established opponent led Obama to develop his online strategy. Businesses can learn from his campaign. mark for My Articles similar articles
Bank Technology News
January 2006
Glen Fest
Data Breach Notification: States Differ On When To Sound The Alarm Legislative action on how and when banks should sound the alarm when there's been a data breach has lagged on the federal level, leading to a broad mix of state measures. mark for My Articles similar articles
InternetNews
August 3, 2010
Health Care Orgs Endure Data Breach Epidemic Hospitals, medical centers and physicians' offices have been responsible for a disproportionately large number of data breaches so far this year, according to one security study. mark for My Articles similar articles
InternetNews
March 17, 2006
Roy Mark
Groups Slam Data Breach Notification Bill A U.S. House panel effort to write a national data breach disclosure law is running into fierce opposition by consumer groups calling the legislation the "worst data security bill ever." mark for My Articles similar articles
InternetNews
April 4, 2008
Verizon Drops Details on New Spectrum Plans Verizon speaks out for the first time on its goals with the 700MHz airwaves. mark for My Articles similar articles
CIO
July 20, 2011
Michael Friedenberg
Pundits Were Right About Mobile Cybersecurity Risks Industry pundits predicted escalating cybersecurity threats, and they were right. mark for My Articles similar articles
PC Magazine
July 1, 2009
Chloe Albanesius
Obama's Cyberspace Crackdown The president lays out new online security measures. mark for My Articles similar articles
InternetNews
April 6, 2007
Andy Patrizio
First 'Real' iPod Virus Rears Its Head Podloso virus does no damage, and only affects iPods with Linux. mark for My Articles similar articles
InternetNews
April 13, 2009
Alex Goldman
Veterans' Health Care Gets Data-Sharing Revamp The creation of a Joint Virtual Lifetime Electronic Record comes amid wider efforts to streamline health care through IT. mark for My Articles similar articles