MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
CIO
October 15, 2009
Bill Brenner
Why Security Matters Now Social networking and cloud computing security threats abound, our annual Global Information Security Survey finds, making information security important once again to business leaders. mark for My Articles similar articles
Insurance & Technology
November 1, 2006
Maria Woehr
Message Mania For insurers, e-mail and instant messaging provide easy ways to share information with distributors and employees, communicate effectively with customers and agents, and help claims adjusters transfer files to turn around claims - all in real time. mark for My Articles similar articles
Bank Systems & Technology
October 21, 2009
Maria Bruno-Britz
Information Security Still a Priority In IT Budgets A survey from PricewaterhouseCoopers shows that infosec budgets are seeing little in the way of cuts, and are even increasing in some cases. mark for My Articles similar articles
CIO
September 29, 2010
Bill Brenner
Why CIOs are Resetting Information Security Priorities Business partners with shoddy information security. Cloud computing vendors with dubious risk controls. What's a CIO to do? A Global Information Security Survey tracks the trends. mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
CIO
June 13, 2011
Bill Bulkeley
What CFOs Care About Besides Your IT Budget CFOs need to understand more than the costs and financial benefits to adopting cloud and consumer technologies. They're also on the hook to protect against risk mark for My Articles similar articles
Insurance & Technology
March 16, 2004
Peggy Bresnick-Kendle
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. mark for My Articles similar articles
Managed Care
November 2006
Ed Silverman
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? mark for My Articles similar articles
Bank Systems & Technology
February 5, 2009
Maria Bruno-Britz
Deloitte Says Financial Crisis May Lead to Security Crisis for Banks Problems with liquidity and customer retention aren't the only challenges that banks will face in 2009. The pressures brought on by the financial crisis are actually increasing banks' vulnerabilities to data breaches. mark for My Articles similar articles
InternetNews
September 25, 2009
Companies Still Not Securing Customer Data New data security survey finds 71 percent admit that cost and lack of resources keeps them from making data security a top priority. mark for My Articles similar articles
CIO
October 15, 2003
Scott Berinato
The State of Information Security 2003 The State of IT Security 2003 survey covered six continents, 54 countries and included more than 7,500 respondents. What emerged is a portrait of a new discipline taking baby steps toward defining norms and developing best practices. mark for My Articles similar articles
Bank Systems & Technology
November 17, 2009
Maria Bruno-Britz
IT Execs Fear Retribution From Former Employees Ernst & Young's latest information security survey shows that senior IT executives feel their systems will need to be better monitored against attack from ex-employees. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Jack Milligan
Knee Deep in Regulation As part of the fallout from the latest financial crisis, bankers are wading through new layers of regulation while scanning for clearer skies ahead. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
IndustryWeek
August 1, 2005
John Teresko
Protecting Intellectual Capital Strategic initiatives such as nanotechnology heighten the need for intellectual property safeguards. Here is a list of steps you can take to protect your company. mark for My Articles similar articles
CIO
October 12, 2012
George Hulme
CIOs and CSOs Have a Costly Disconnect Companies stand to lose millions when CIO-CSO priorities aren't in sync, according to this year's Global Information Security Survey, conducted by PricewaterhouseCoopers and CSO magazine. mark for My Articles similar articles
Investment Advisor
May 2007
Joni Youngwirth
Risk Management--for Yourself Think you've got a handle on risks to your financial advisory practice? Think again. mark for My Articles similar articles
Bank Technology News
August 2010
Edward W. Powers
Convergence As a Cyberwar Weapon Banks and businesses should consider restructuring the way they protect themselves, their computer systems and their customers. mark for My Articles similar articles
Wall Street & Technology
August 22, 2005
Atul Seth
Mutual Fund Musts Seven key compliance imperatives that will have a major impact on the mutual fund industry over the next year and suggestions on how firms can meet the challenges posed by the requirements successfully. mark for My Articles similar articles
Bank Technology News
April 2009
Rebecca Sausner
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. mark for My Articles similar articles
CIO
September 28, 2011
George V. Hulme
Are CIOs Too Cocky About Security? The vast majority of tech and business execs are overconfident about their security policies. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
Financial Planning
September 1, 2006
Jane Worthington
Accounting for Compliance Instead of viewing compliance as a necessary evil, financial advisors should see it as a cost of doing business and learn how to quantify that cost. mark for My Articles similar articles
Pharmaceutical Executive
January 1, 2013
Ben Comer
Compliance in the C-Suite Compliance officers have risen into pharmaceutical management's highest ranks, by choice in some organizations, and by government decree in others. Either way, their importance as a strategic partner can hardly be understated. mark for My Articles similar articles
Bio-IT World
January 12, 2004
Steve Lefar
Systematize Your Regulatory Info! Want better protection against regulation breaches? Build a system that engenders 'grassroots' compliance. mark for My Articles similar articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
CIO
May 15, 2006
Diann Daniel
Regulation's Silver Lining John Hagerty, vice president of research with AMR, says regulatory mandates have put a new spotlight on IT as a means to mitigate business risk. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
Entrepreneur
November 2009
Gwen Moran
Social (Networking) Security How to keep your company safe from privacy leaks online. mark for My Articles similar articles
InternetNews
November 8, 2004
Jim Wagner
Report: A Misplaced Sense of Security? As many as 20 percent of big business networks admit to unauthorized breaches, yet many feel more secure. mark for My Articles similar articles
Bio-IT World
April 15, 2003
Barbara Depompa Reimers
Easing the Pain of Part 11 Costs for complying with FDA electronic records regulations will cost millions of dollars per company by 2006. Risk-based processes can lighten the load. mark for My Articles similar articles
Bank Technology News
January 2006
Better Info Security Driven By Regulatory Compliance If information security is to become a strategic priority, then banks can start by reviewing existing practices -- their own and that of those companies with which they do business. mark for My Articles similar articles
U.S. Banker
November 2007
Patrick Conte
Embrace This Acronym: IT GRC. It Could Save Banks a Bundle. Used to describe the interdependent disciplines of governance, risk and compliance, GRC refers to the people, processes and technology banks invest in to comply with regulations and manage risk as part of effective corporate governance. mark for My Articles similar articles
Entrepreneur
November 2003
Eric Bender
On Guard What does it take to keep your computers and intellectual property safe? More than you think. mark for My Articles similar articles
CIO
July 15, 2005
Juan Carlos Perez
Internet Users Ignorant About Data Privacy Internet users in the United States are dangerously ignorant about the type of data that website owners collect from them and how that data is used, making them vulnerable to fraud and misuse of their personal information, a new study finds. mark for My Articles similar articles
Insurance & Technology
June 14, 2005
Wendy Toth
Securing Compliance: System, Project or Process? Database and application security products are growing in popularity as companies look for ways to keep up with regulatory demands like Sarbanes-Oxley. mark for My Articles similar articles
Bank Systems & Technology
July 1, 2005
Martin J. Garvey
Storage Networks: One More Potential Weak Link Before regulatory compliance, nobody got jail time for lost or compromised data or paid millions of dollars in fines. Now, any company can be pulled into court and asked to produce evidence of security procedures or face penalties. So, are compliance regulations forcing companies to re-evaluate their storage-security practices? mark for My Articles similar articles
CIO
February 1, 2002
Lorraine Cosgrove Ware
Invest in Privacy Policies and Keep Your Customers To maintain loyalty, it's important to consider your customers and recognize what other companies are doing to ensure their privacy... mark for My Articles similar articles
Wall Street & Technology
March 2, 2004
Brendon Lynch
Web-Privacy Management Increases in Importance An organization's reputation is increasingly at risk online. Financial-services firms, in particular, are constantly updating their Web sites to provide readily accessible information, services and products to their customers and provide a high degree of visibility for the company and its brands.. mark for My Articles similar articles
U.S. Banker
March 2007
Paresh Amin
Balancing Industry Mandates and Federal Regulations Financial companies need to consider compliance, business objectives and data security in a holistic manner. All three can be boiled down to one main requirement: determining what is happening to critical data. mark for My Articles similar articles
IndustryWeek
January 1, 2007
Jonathan Katz
Intellectual Property: Feeling A Little Insecure? Hiring of information security professionals grows. mark for My Articles similar articles
Insurance & Technology
June 16, 2004
Julie Gallagher
Look On the Bright Side Rather than letting the clouds of regulation rain on their operations, insurers that look for compliance's silver lining have an opportunity to improve their business processes. mark for My Articles similar articles
Pharmaceutical Executive
July 1, 2005
Ellen H. Julian
What Pharma Wants From IT Today Indications that compliance and productivity issues reign over information technology (IT) budgets at pharma companies were verified in the 2005 Pharmaceutical Executive/Life Science Insights Information Technology Survey of nearly 850 US pharma companies. mark for My Articles similar articles
HRO Today
Mar/Apr 2008
Kerry Ann Vales
Compliance Outsourcing Gaining New Ground in HRO Contracts In a world of changing regulations, employers are increasingly looking to service providers to help ensure they meet all applicable mandates. Expect more contracts, especially mid-market ones, to tack on compliance as part of the service delivery. mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Peggy Bresnick Kendler
The Compliance Challenge Industry experts offer opinions on what the biggest challenges carriers currently face in terms of regulatory compliance. mark for My Articles similar articles
Searcher
August 2000
Josh Duberman & Michael Beaudet
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. mark for My Articles similar articles
InternetNews
December 8, 2008
Richard Adhikari
Survey Finds Data Breaches Hit Most Enterprises Despite the growing number of data breaches reported by U.S. businesses, corporate database security is still not up to scratch. Yet many admins and senior management still feel confident in their security precautions. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. mark for My Articles similar articles