MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 19, 2008
Richard Adhikari
Collaboration Apps Mean New Security Concerns Sure, it's cool to aim at joining the Enterprise 2.0 crowd, but it opens up your business to security problems. mark for My Articles similar articles
InternetNews
March 23, 2011
McAfee Acquires Sentrigo for Database Security Intel's security division goes after Database security with Sentrigo and its Hedgehog database security products. mark for My Articles similar articles
Bank Systems & Technology
November 17, 2009
Maria Bruno-Britz
IT Execs Fear Retribution From Former Employees Ernst & Young's latest information security survey shows that senior IT executives feel their systems will need to be better monitored against attack from ex-employees. mark for My Articles similar articles
Wall Street & Technology
September 18, 2006
Enterprise Data Security Solutions: Variety Is the Spice of Life Enterprise data breaches continue to grab headlines and C-level attention. To combat the threat, companies are using a variety of technologies, according to a new survey of 802 IT executives. mark for My Articles similar articles
InternetNews
February 14, 2011
Oracle Tunes Up Database Security With Firewall In a bid to shore up the security of crucial IT assets, Oracle has unveiled its Database Firewall product, which seeks to guard against SQL injections and other database attacks. mark for My Articles similar articles
Bank Systems & Technology
February 5, 2009
Maria Bruno-Britz
Deloitte Says Financial Crisis May Lead to Security Crisis for Banks Problems with liquidity and customer retention aren't the only challenges that banks will face in 2009. The pressures brought on by the financial crisis are actually increasing banks' vulnerabilities to data breaches. mark for My Articles similar articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
Bank Technology News
April 2009
Rebecca Sausner
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. mark for My Articles similar articles
InternetNews
August 29, 2005
Jim Wagner
Work Remains for Sarbox Compliance Businesses have a lot of work ahead of them before they're fully compliant with federal data retention and financial reporting rules under the Sarbanes-Oxley Act, a new study concludes. mark for My Articles similar articles
InternetNews
January 20, 2011
EnterpriseDB Bows New Postgres; Security Tools Latest commercial version of the open source PostgreSQL database is released. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties. mark for My Articles similar articles
Insurance & Technology
February 8, 2004
Auditing Technology from ACL Services ACL Services Ltd., a provider of audit and data analysis technology to financial executives and audit professionals, has launched the Continuous Controls Monitoring solution suite. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
InternetNews
March 17, 2008
Judy Mottl
Survey: Data Archival Efforts Inefficient New report cites weak archival strategies and high risk for data. mark for My Articles similar articles
CFO
May 1, 2008
Kate O'Sullivan
Can This Relationship Be Saved? Auditors and CFOs aren't the friends they once were, but they are working out their differences. mark for My Articles similar articles
InternetNews
April 8, 2011
Rapid7 Accelerates Security with NeXpose New release of NeXpose 4.11 security solution includes new database architecture and expanded capabilities. mark for My Articles similar articles
InternetNews
January 12, 2009
Richard Adhikari
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. mark for My Articles similar articles
Wall Street & Technology
February 25, 2008
Melanie Rodier
Ineffective Access Management Poses Risk to Businesses A new study shows that the majority of IT professionals view collaboration among business units and audit, compliance and IT security functions as critical to achieving good access management, but most feel it isn't happening. mark for My Articles similar articles
CFO
June 15, 2012
Sarah Johnson
Do Your Internal Auditors Have the Right Skills? Companies are putting a premium on critical thinking and data-mining expertise. mark for My Articles similar articles
InternetNews
August 18, 2009
Enterprise App Developers Use Insecure Data Credit card numbers, customer information, and even employee records are inadequately protected in development environments, according to a new report. mark for My Articles similar articles
InternetNews
May 24, 2011
Amazon Puts Oracle's Database in the Cloud Amazon.com has unveiled a new cloud service based on Oracle database technology. mark for My Articles similar articles
CRM
January 19, 2015
Maria Minsker
Cybersecurity Is Not Just About Protection, but Detection Too Enterprises must prepare to tackle inevitable breaches in 2015. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
InternetNews
January 12, 2011
Xeround Builds Out MySQL Cloud Platform Software vendor Xeround bringing components of the open source database to the cloud with new public beta release, melding features of NoSQL and SQL offerings. mark for My Articles similar articles
Wall Street & Technology
January 5, 2006
Loose Lips Sink Ships Unbeknownst to many executives, employees using the corporate e-mail system place their companies at risk every day, according to a survey conducted for an e-mail archiving solution provider. mark for My Articles similar articles
Bank Technology News
January 2006
Better Info Security Driven By Regulatory Compliance If information security is to become a strategic priority, then banks can start by reviewing existing practices -- their own and that of those companies with which they do business. mark for My Articles similar articles
InternetNews
December 13, 2010
Data Breach Exposes Wisconsin Students' Data The University of Wisconsin became the latest U.S. college to endure a major data breach this year, putting the personal information of 60,000-plus former students and staff members at risk. mark for My Articles similar articles
InternetNews
April 23, 2004
Sean Michael Kerner
Study: Increase in Security Training Paying Off After dragging their feet on the spend, organizations see their investments in security training pay off, CompTIA finds. mark for My Articles similar articles
InternetNews
October 20, 2008
Richard Adhikari
Sun Pounces on Access Management With concern over internal data breaches and compliance growing, Sun Microsystems today rolled out Sun Identity Compliance Manager to tackle these problems. mark for My Articles similar articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
IndustryWeek
July 1, 2007
Brad Kenney
Web 2.0 Adoption According to a recent McKinsey executive survey, 70% of respondents say they are using some combination of 2.0 technologies for communicating with their customers. mark for My Articles similar articles
InternetNews
July 10, 2009
Alex Goldman
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access. mark for My Articles similar articles
Wall Street & Technology
March 1, 2004
Institutions Find it Tough to Meet Sarbox Deadline As the first deadline for Sarbanes-Oxley compliance of June 15 nears, financial-institutions are finding that complying is more difficult than they had anticipated mark for My Articles similar articles
InternetNews
August 25, 2009
Measuring and Mitigating the Insider Threat A study finds that no enterprise is immune from the perils of negligence or malicious activity. mark for My Articles similar articles
Bank Director
4th Quarter 2009
Kenneth L. Glascock
Internal Audit: Boosting Your ROI A high-performance audit function can help the bank and board achieve its risk-adjusted goals. mark for My Articles similar articles
Bank Technology News
March 2007
Holly Sraeel
Protecting Data Online Is a Top Priority for Consumers Today, consumers recognize that fraud is no laughing matter. According to a study, 41% of respondents would decrease their use of online banking or switch institutions in the wake of a data breach. mark for My Articles similar articles
InternetNews
January 18, 2005
Sean Michael Kerner
CIOs See Steady Growth in IT Budgets Research firm forecasts IT budgets to rise by 2.5 percent in 2005. mark for My Articles similar articles
CFO
March 15, 2006
David M. Katz
A Tough Act to Follow What CFOs really think about Sarbox -- and how they would fix it. Included are the results of an exclusive survey of finance executives on the topic. mark for My Articles similar articles
Information Today
July 30, 2015
Amazon Web Services Expands Access to Amazon Aurora Amazon Web Services is making Amazon Aurora (its MySQL-compatible database engine) available to all customers. mark for My Articles similar articles
Managed Care
May 2005
Covering the Uninsured Seen as Legislative Priority Opinion leaders say Congress should also act to improve quality and safety, and ensure Medicare solvency. mark for My Articles similar articles
Bank Director
2nd Quarter 2009
Karen Epper Hoffman
Beware the Inside Job In this time of unprecedented layoffs, massive budget cuts, and related merger activity, banks need to be careful of the security threat that lies within their own organization. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
Information Today
October 11, 2012
EBSCO Adds Health Economic Evaluations Database The Health Economic Evaluations Database, containing information on studies of cost-effectiveness and other forms of economic evaluation of medicines, is now available from EBSCO. mark for My Articles similar articles
The Motley Fool
September 16, 2009
Tim Beyers
The iPhone Is Still Bigger Than You Think 79% of 300 IT directors surveyed say their employees would prefer to use their own devices to access corporate networks than company-issued devices. Their overwhelming choice -- 82% of those surveyed -- was the iPhone. mark for My Articles similar articles
InternetNews
October 20, 2009
Privacy Still Dogs Electronic Health Records New study highlights security shortcomings with the ways medical facilities are digitizing patients' records. mark for My Articles similar articles
CFO
May 1, 2008
Alix Stuart
Auditor Angst Want faster, cheaper audits? Your auditor humbly suggests you avoid last-minute data dumps and other less-than-helpful practices. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Ray Milnes
Audit Committees -- A Perspective on Utilizing Internal Audit Resources A brisk current of regulatory change is sweeping through America's corporate boardrooms aimed at strengthening the independence and effectiveness of corporate audit committees, including those of REITs and other publicly traded real estate companies... mark for My Articles similar articles
CIO
October 15, 2008
Kim S. Nash
Why Technology Isn't The Answer To Better Security You've beefed up your IT security arsenal, and you're focused on compliance. But you're still vulnerable. Here's why. mark for My Articles similar articles