MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 5181-5190 Newer>
PC World
February 21, 2007
Stuart J. Johnston
Critical IE Graphics Flaw Resurfaces Microsoft-only Internet graphics format exploited... More Office holes... A major Adobe problem that affects all browsers... mark for My Articles 959 similar articles
Inc.
March 2007
Dan Briody
Keep Out Now, hackers are finding it difficult to break into big businesses. They find it more lucrative to go after the small companies that don't have the resources to defend themselves. mark for My Articles 124 similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles 392 similar articles
InternetNews
February 28, 2007
Nicholas Carlson
Brokerage Web Sites Hit Hard By Dow Drop As the markets plunged yesterday, wait times on some of the largest online brokerage fell, too. mark for My Articles 261 similar articles
U.S. Banker
March 2007
Enterprise Rights Management: Sealing Data With Yet Another Lock Goldman Sachs is at the forefront of enterprise rights management, designed to protect the most tightly held intellectual capital. Expect commercial banks to be next in line. mark for My Articles 90 similar articles
U.S. Banker
March 2007
Paresh Amin
Balancing Industry Mandates and Federal Regulations Financial companies need to consider compliance, business objectives and data security in a holistic manner. All three can be boiled down to one main requirement: determining what is happening to critical data. mark for My Articles 745 similar articles
InternetNews
February 27, 2007
Ed Sutherland
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. mark for My Articles 487 similar articles
Bank Technology News
February 2007
Glen Fest
Anti-Malware: Calling Off the Watchdogs First National Bank of Bosque County opts out of anti-virus protection for a new whitelisting, or application control, approach. mark for My Articles 32 similar articles
Bank Technology News
February 2007
John Adams
Email Mistakes: Giving Away the Store, Without Knowing it Inside jobs don't have to be the work of disgruntled bank employees. New research suggests most email-related exposure of sensitive data is accidental. mark for My Articles 351 similar articles
Bank Technology News
February 2007
Michael Dumiak
Web Risk: A Growing Web's Harder To Secure As Web 2.0 applications and uses become more widespread, it'll be more than the created communities that are vulnerable. The increase of functionality, the richness of sites, creates more vectors for attack. mark for My Articles 25 similar articles
<Older 5181-5190 Newer>    Return to current articles.