| Similar Articles |
 |
CIO April 15, 2006 Matt Villano |
A Better Way to Search for Trouble Splunk is a system log search tool that empowers system administrators to scrutinize their network performance logs more easily.  |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security.  |
InternetNews May 11, 2009 Alex Goldman |
UC Berkeley Says Hackers Breached Database Officials at the University of California at Berkeley on Friday began notifying students and the public that hackers had breached a healthcare database at the school, potentially gaining access to the personal information of up to 160,000 students dating back to 1999.  |
InternetNews July 10, 2009 Alex Goldman |
Calif. Heath Firms Claim 800+ Breaches in 2009 New laws prompt an overwhelming number of reported incidents of inappropriate data access.  |
InternetNews June 22, 2010 |
LogRhythm Mining Log Files for Better Security Security information and event management vendor LogRhythm updates its platform to offer enterprises a new path to security with added visibility into their log files.  |
InternetNews November 25, 2008 Richard Adhikari |
Mainframe Breach at LensCrafters Parent Hits 59K Eyewear giant Luxottica Group becomes the latest in a string of high-profile data leaks.  |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders...  |
Wall Street & Technology September 18, 2006 |
Enterprise Data Security Solutions: Variety Is the Spice of Life Enterprise data breaches continue to grab headlines and C-level attention. To combat the threat, companies are using a variety of technologies, according to a new survey of 802 IT executives.  |
InternetNews February 10, 2011 Sean Michael Kerner |
LogRhythm Pattern Tech Targets Network Security LogRhythm, a security information and event manager vendor, unveils its Advanced Intelligence Engine, using pattern recognition technology to shore up networks.  |
InternetNews February 2, 2009 Richard Adhikari |
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties.  |
InternetNews July 2, 2009 Alex Goldman |
Enterprise Software Focuses on Ease of Use Enterprise-class software, not something you can install in 15 minutes, gets a user-friendly polish.  |
Macworld February 2001 Mel Beckman |
FunnelWeb 4.0 Web-Log Analyzer Makes Gorgeous Graphs of Your Data...  |
InternetNews June 9, 2009 Alex Goldman |
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names.  |
CIO January 2007 |
Data Breaches Cost You More Data breaches continue to become more expensive.  |
InternetNews March 9, 2011 |
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow.  |
IEEE Spectrum August 2008 Prachi Patel-Predd |
Data Theft by Partner Companies on the Rise Data breaches involving trusted third parties -- business partners, vendors, suppliers, and contractors -- are alarmingly on the rise, according to a recent investigation by the security team at Verizon Business.  |
PC World May 2006 Scott Dunn |
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free...  |
InternetNews January 26, 2010 |
Average Cost of Data Breach $6.75m in 2009 New study from Ponemon Institute and PGP Corp. shows rising costs for businesses associated with data breaches.  |
InternetNews April 8, 2009 Alex Goldman |
U.S. Electricity Grid Compromised The threat is real but, unfortunately, not new. What is new, say reports, is actual evidence of espionage.  |
InternetNews June 18, 2009 Alex Goldman |
The Offline Vulnerability of Personal Data Organizations cannot substitute technology for common sense in the handling of personal information, warns a new report.  |
Bank Systems & Technology November 6, 2008 Orla O'Sullivan |
2008 Data Breaches: 30 Million and Counting Roughly 30 million consumers have had sensitive personal data stolen in the 552 reported data breaches so far in 2008.  |
This Old House Curtis Rist |
U.S. Architecture: The Love and Lore of Log Cabins No house style exemplifies our national identity as sweetly as the humble log cabin -- just think of Lincoln's birthplace.  |