Similar Articles |
|
InternetNews December 19, 2008 Richard Adhikari |
Collaboration Apps Mean New Security Concerns Sure, it's cool to aim at joining the Enterprise 2.0 crowd, but it opens up your business to security problems. |
InternetNews March 23, 2011 |
McAfee Acquires Sentrigo for Database Security Intel's security division goes after Database security with Sentrigo and its Hedgehog database security products. |
Bank Systems & Technology November 17, 2009 Maria Bruno-Britz |
IT Execs Fear Retribution From Former Employees Ernst & Young's latest information security survey shows that senior IT executives feel their systems will need to be better monitored against attack from ex-employees. |
Wall Street & Technology September 18, 2006 |
Enterprise Data Security Solutions: Variety Is the Spice of Life Enterprise data breaches continue to grab headlines and C-level attention. To combat the threat, companies are using a variety of technologies, according to a new survey of 802 IT executives. |
InternetNews February 14, 2011 |
Oracle Tunes Up Database Security With Firewall In a bid to shore up the security of crucial IT assets, Oracle has unveiled its Database Firewall product, which seeks to guard against SQL injections and other database attacks. |
Bank Systems & Technology February 5, 2009 Maria Bruno-Britz |
Deloitte Says Financial Crisis May Lead to Security Crisis for Banks Problems with liquidity and customer retention aren't the only challenges that banks will face in 2009. The pressures brought on by the financial crisis are actually increasing banks' vulnerabilities to data breaches. |
InternetNews July 13, 2009 |
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. |
Bank Technology News April 2009 Rebecca Sausner |
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. |
InternetNews August 29, 2005 Jim Wagner |
Work Remains for Sarbox Compliance Businesses have a lot of work ahead of them before they're fully compliant with federal data retention and financial reporting rules under the Sarbanes-Oxley Act, a new study concludes. |
InternetNews January 20, 2011 |
EnterpriseDB Bows New Postgres; Security Tools Latest commercial version of the open source PostgreSQL database is released. |
InternetNews February 2, 2009 Richard Adhikari |
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties. |
Insurance & Technology February 8, 2004 |
Auditing Technology from ACL Services ACL Services Ltd., a provider of audit and data analysis technology to financial executives and audit professionals, has launched the Continuous Controls Monitoring solution suite. |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. |
InternetNews March 17, 2008 Judy Mottl |
Survey: Data Archival Efforts Inefficient New report cites weak archival strategies and high risk for data. |
CFO May 1, 2008 Kate O'Sullivan |
Can This Relationship Be Saved? Auditors and CFOs aren't the friends they once were, but they are working out their differences. |
InternetNews April 8, 2011 |
Rapid7 Accelerates Security with NeXpose New release of NeXpose 4.11 security solution includes new database architecture and expanded capabilities. |
InternetNews January 12, 2009 Richard Adhikari |
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. |
Wall Street & Technology February 25, 2008 Melanie Rodier |
Ineffective Access Management Poses Risk to Businesses A new study shows that the majority of IT professionals view collaboration among business units and audit, compliance and IT security functions as critical to achieving good access management, but most feel it isn't happening. |
CFO June 15, 2012 Sarah Johnson |
Do Your Internal Auditors Have the Right Skills? Companies are putting a premium on critical thinking and data-mining expertise. |
InternetNews August 18, 2009 |
Enterprise App Developers Use Insecure Data Credit card numbers, customer information, and even employee records are inadequately protected in development environments, according to a new report. |
InternetNews May 24, 2011 |
Amazon Puts Oracle's Database in the Cloud Amazon.com has unveiled a new cloud service based on Oracle database technology. |
CRM January 19, 2015 Maria Minsker |
Cybersecurity Is Not Just About Protection, but Detection Too Enterprises must prepare to tackle inevitable breaches in 2015. |
InternetNews July 9, 2009 Alex Goldman |
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. |
InternetNews January 12, 2011 |
Xeround Builds Out MySQL Cloud Platform Software vendor Xeround bringing components of the open source database to the cloud with new public beta release, melding features of NoSQL and SQL offerings. |
Wall Street & Technology January 5, 2006 |
Loose Lips Sink Ships Unbeknownst to many executives, employees using the corporate e-mail system place their companies at risk every day, according to a survey conducted for an e-mail archiving solution provider. |
Bank Technology News January 2006 |
Better Info Security Driven By Regulatory Compliance If information security is to become a strategic priority, then banks can start by reviewing existing practices -- their own and that of those companies with which they do business. |
InternetNews December 13, 2010 |
Data Breach Exposes Wisconsin Students' Data The University of Wisconsin became the latest U.S. college to endure a major data breach this year, putting the personal information of 60,000-plus former students and staff members at risk. |
InternetNews April 23, 2004 Sean Michael Kerner |
Study: Increase in Security Training Paying Off After dragging their feet on the spend, organizations see their investments in security training pay off, CompTIA finds. |
InternetNews October 20, 2008 Richard Adhikari |
Sun Pounces on Access Management With concern over internal data breaches and compliance growing, Sun Microsystems today rolled out Sun Identity Compliance Manager to tackle these problems. |
CIO September 15, 2005 Scott Berinato |
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. |
IndustryWeek July 1, 2007 Brad Kenney |
Web 2.0 Adoption According to a recent McKinsey executive survey, 70% of respondents say they are using some combination of 2.0 technologies for communicating with their customers. |
InternetNews July 10, 2009 Alex Goldman |
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access. |
Wall Street & Technology March 1, 2004 |
Institutions Find it Tough to Meet Sarbox Deadline As the first deadline for Sarbanes-Oxley compliance of June 15 nears, financial-institutions are finding that complying is more difficult than they had anticipated |
InternetNews August 25, 2009 |
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. |
Bank Director 4th Quarter 2009 Kenneth L. Glascock |
Internal Audit: Boosting Your ROI A high-performance audit function can help the bank and board achieve its risk-adjusted goals. |
Bank Technology News March 2007 Holly Sraeel |
Protecting Data Online Is a Top Priority for Consumers Today, consumers recognize that fraud is no laughing matter. According to a study, 41% of respondents would decrease their use of online banking or switch institutions in the wake of a data breach. |
InternetNews January 18, 2005 Sean Michael Kerner |
CIOs See Steady Growth in IT Budgets Research firm forecasts IT budgets to rise by 2.5 percent in 2005. |
CFO March 15, 2006 David M. Katz |
A Tough Act to Follow What CFOs really think about Sarbox -- and how they would fix it. Included are the results of an exclusive survey of finance executives on the topic. |
Information Today July 30, 2015 |
Amazon Web Services Expands Access to Amazon Aurora Amazon Web Services is making Amazon Aurora (its MySQL-compatible database engine) available to all customers. |
Managed Care May 2005 |
Covering the Uninsured Seen as Legislative Priority Opinion leaders say Congress should also act to improve quality and safety, and ensure Medicare solvency. |
Bank Director 2nd Quarter 2009 Karen Epper Hoffman |
Beware the Inside Job In this time of unprecedented layoffs, massive budget cuts, and related merger activity, banks need to be careful of the security threat that lies within their own organization. |
Bank Director 2nd Quarter 2010 Glascock & Gaulke |
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
Information Today October 11, 2012 |
EBSCO Adds Health Economic Evaluations Database The Health Economic Evaluations Database, containing information on studies of cost-effectiveness and other forms of economic evaluation of medicines, is now available from EBSCO. |
The Motley Fool September 16, 2009 Tim Beyers |
The iPhone Is Still Bigger Than You Think 79% of 300 IT directors surveyed say their employees would prefer to use their own devices to access corporate networks than company-issued devices. Their overwhelming choice -- 82% of those surveyed -- was the iPhone. |
InternetNews October 20, 2009 |
Privacy Still Dogs Electronic Health Records New study highlights security shortcomings with the ways medical facilities are digitizing patients' records. |
CFO May 1, 2008 Alix Stuart |
Auditor Angst Want faster, cheaper audits? Your auditor humbly suggests you avoid last-minute data dumps and other less-than-helpful practices. |
CFO January 1, 2006 John McPartlin |
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? |
Real Estate Portfolio Mar/Apr 2002 Ray Milnes |
Audit Committees -- A Perspective on Utilizing Internal Audit Resources A brisk current of regulatory change is sweeping through America's corporate boardrooms aimed at strengthening the independence and effectiveness of corporate audit committees, including those of REITs and other publicly traded real estate companies... |
CIO October 15, 2008 Kim S. Nash |
Why Technology Isn't The Answer To Better Security You've beefed up your IT security arsenal, and you're focused on compliance. But you're still vulnerable. Here's why. |