MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
April 15, 2006
Matt Villano
A Better Way to Search for Trouble Splunk is a system log search tool that empowers system administrators to scrutinize their network performance logs more easily. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
May 11, 2009
Alex Goldman
UC Berkeley Says Hackers Breached Database Officials at the University of California at Berkeley on Friday began notifying students and the public that hackers had breached a healthcare database at the school, potentially gaining access to the personal information of up to 160,000 students dating back to 1999. mark for My Articles similar articles
InternetNews
July 10, 2009
Alex Goldman
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access. mark for My Articles similar articles
InternetNews
June 22, 2010
LogRhythm Mining Log Files for Better Security Security information and event management vendor LogRhythm updates its platform to offer enterprises a new path to security with added visibility into their log files. mark for My Articles similar articles
InternetNews
November 25, 2008
Richard Adhikari
Mainframe Breach at LensCrafters Parent Hits 59K Eyewear giant Luxottica Group becomes the latest in a string of high-profile data leaks. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
Wall Street & Technology
September 18, 2006
Enterprise Data Security Solutions: Variety Is the Spice of Life Enterprise data breaches continue to grab headlines and C-level attention. To combat the threat, companies are using a variety of technologies, according to a new survey of 802 IT executives. mark for My Articles similar articles
InternetNews
February 10, 2011
Sean Michael Kerner
LogRhythm Pattern Tech Targets Network Security LogRhythm, a security information and event manager vendor, unveils its Advanced Intelligence Engine, using pattern recognition technology to shore up networks. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties. mark for My Articles similar articles
InternetNews
July 2, 2009
Alex Goldman
Enterprise Software Focuses on Ease of Use Enterprise-class software, not something you can install in 15 minutes, gets a user-friendly polish. mark for My Articles similar articles
Macworld
February 2001
Mel Beckman
FunnelWeb 4.0 Web-Log Analyzer Makes Gorgeous Graphs of Your Data... mark for My Articles similar articles
InternetNews
June 9, 2009
Alex Goldman
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. mark for My Articles similar articles
CIO
January 2007
Data Breaches Cost You More Data breaches continue to become more expensive. mark for My Articles similar articles
InternetNews
March 9, 2011
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow. mark for My Articles similar articles
IEEE Spectrum
August 2008
Prachi Patel-Predd
Data Theft by Partner Companies on the Rise Data breaches involving trusted third parties -- business partners, vendors, suppliers, and contractors -- are alarmingly on the rise, according to a recent investigation by the security team at Verizon Business. mark for My Articles similar articles
PC World
May 2006
Scott Dunn
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free... mark for My Articles similar articles
InternetNews
January 26, 2010
Average Cost of Data Breach $6.75m in 2009 New study from Ponemon Institute and PGP Corp. shows rising costs for businesses associated with data breaches. mark for My Articles similar articles
InternetNews
April 8, 2009
Alex Goldman
U.S. Electricity Grid Compromised The threat is real but, unfortunately, not new. What is new, say reports, is actual evidence of espionage. mark for My Articles similar articles
InternetNews
June 18, 2009
Alex Goldman
The Offline Vulnerability of Personal Data Organizations cannot substitute technology for common sense in the handling of personal information, warns a new report. mark for My Articles similar articles
Bank Systems & Technology
November 6, 2008
Orla O'Sullivan
2008 Data Breaches: 30 Million and Counting Roughly 30 million consumers have had sensitive personal data stolen in the 552 reported data breaches so far in 2008. mark for My Articles similar articles
This Old House
Curtis Rist
U.S. Architecture: The Love and Lore of Log Cabins No house style exemplifies our national identity as sweetly as the humble log cabin -- just think of Lincoln's birthplace. mark for My Articles similar articles