| Similar Articles |
 |
Wall Street & Technology February 25, 2008 Melanie Rodier |
Ineffective Access Management Poses Risk to Businesses A new study shows that the majority of IT professionals view collaboration among business units and audit, compliance and IT security functions as critical to achieving good access management, but most feel it isn't happening.  |
InternetNews December 8, 2008 Richard Adhikari |
Survey Finds Data Breaches Hit Most Enterprises Despite the growing number of data breaches reported by U.S. businesses, corporate database security is still not up to scratch. Yet many admins and senior management still feel confident in their security precautions.  |
InternetNews May 7, 2010 |
Microsoft Strengthens SharePoint Security Two new products, Forefront Protection 2010 and Active Directory Federation Services 2.0, are designed to provide secure collaboration for users of Microsoft's SharePoint.  |
Bank Technology News March 2007 Holly Sraeel |
Protecting Data Online Is a Top Priority for Consumers Today, consumers recognize that fraud is no laughing matter. According to a study, 41% of respondents would decrease their use of online banking or switch institutions in the wake of a data breach.  |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas.  |
InternetNews August 18, 2009 |
Enterprise App Developers Use Insecure Data Credit card numbers, customer information, and even employee records are inadequately protected in development environments, according to a new report.  |
InternetNews January 5, 2009 Richard Adhikari |
The Dangers of Web Access As companies rely more heavily on the Web in their move toward Enterprise 2.0, they face an increasing number of security and network problems.  |
Bank Technology News September 2008 Anthony Malakian |
Budgets Inch Up The top priorities for bank security spending are fraud detection for money transfers and an AML system, followed by fraud detection for online banking.  |
Bank Systems & Technology November 3, 2003 Ivan Schneider |
Information Security: Room for Improvement Financial institutions could do better, but the unique concerns of the industry will result in valuable lessons to share with other industries and government.  |
Bank Technology News April 2009 Rebecca Sausner |
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before.  |
InternetNews October 15, 2008 Richard Adhikari |
Microsoft SharePoint Ecosystem Growing Third-party vendors do well feeding off Microsoft, but enterprises may need to keep an eye peeled for new developments.  |
InternetNews October 1, 2004 Sean Michael Kerner |
SOA Investments on The Rise, Yankee Says A new survey by Yankee Group finds that enterprises are embracing service oriented architectures in their networks at a much swifter pace.  |
InternetNews February 2, 2009 Richard Adhikari |
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties.  |
Bank Systems & Technology February 5, 2009 Maria Bruno-Britz |
Deloitte Says Financial Crisis May Lead to Security Crisis for Banks Problems with liquidity and customer retention aren't the only challenges that banks will face in 2009. The pressures brought on by the financial crisis are actually increasing banks' vulnerabilities to data breaches.  |
InternetNews August 7, 2009 |
Facebook Moving Up Fast in the Enterprise Study reveals growing use of Facebook, but watch out for Microsoft and IBM. Brand loyalty, customer service, customer loyalty and acquisition were the top benefits noted.  |
Insurance & Technology October 29, 2003 Ivan Schneider |
IT Security: Room for Improvement Financial services companies could still do better, but the unique concerns of the industry will result in valuable lessons to share with other industries and government.  |
CFO January 1, 2006 John McPartlin |
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond?  |
InternetNews March 9, 2011 |
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow.  |
CIO September 15, 2005 Scott Berinato |
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking.  |
InternetNews November 8, 2004 Jim Wagner |
Report: A Misplaced Sense of Security? As many as 20 percent of big business networks admit to unauthorized breaches, yet many feel more secure.  |
Wall Street & Technology March 1, 2004 |
Institutions Find it Tough to Meet Sarbox Deadline As the first deadline for Sarbanes-Oxley compliance of June 15 nears, financial-institutions are finding that complying is more difficult than they had anticipated  |
BusinessWeek April 18, 2005 |
"IBM Isn't Doing That Much" Microsoft's chairman says when it comes to productivity software, his company "has to push the frontiers on our own."  |
IndustryWeek January 1, 2007 Jonathan Katz |
Intellectual Property: Feeling A Little Insecure? Hiring of information security professionals grows.  |
InternetNews May 11, 2010 |
SharePoint Could Shape Firms' Office 2010 Plans SharePoint collaboration server heads for next release with a host of new features Microsoft is pitching to enterprise clients.  |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise.  |
InternetNews October 29, 2008 Sean Michael Kerner |
Security Problem? Blame the Human Element Cisco study finds that security policies are often not respected by end users.  |
CIO October 15, 2008 Jarina D'Auria |
Security Breaches: Three Tools for Preventing Data Loss Protecting against data loss from security breaches requires a combination of tools to secure networks, systems, and data.  |
Bank Systems & Technology March 30, 2007 J. Nicholas Hoover |
Adoption of Web 2.0 Is Taking Off, But Some Firms Are Still Reluctant Business technologists are concerned about security, return on investment and their staffs' skill in implementing and integrating new Web tools. While some financial services companies are plunging into Enterprise 2.0, it still is an emerging technology.  |
Wall Street & Technology October 23, 2007 Melanie Rodier |
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel.  |
InternetNews July 8, 2010 |
SharePoint Deployments Lack Planning: Study Research finds that while the number of SharePoint deployments are growing, those efforts aren't always properly planned.  |
CIO September 28, 2011 George V. Hulme |
Are CIOs Too Cocky About Security? The vast majority of tech and business execs are overconfident about their security policies.  |
InternetNews February 10, 2009 Richard Adhikari |
Microsoft Ties SharePoint to Enterprise Search Microsoft takes another whack at enterprise search by leveraging its highly popular SharePoint server.  |
InternetNews May 12, 2010 Stuart J. Johnston |
Microsoft SharePoint Key to Office 2010 Rollout In what it describes as a one-two punch, Microsoft is betting big on the enterprise with the twin rollouts of SharePoint and Office 2010, hoping that the collaboration server will drive sales of the productivity suite.  |
InternetNews October 20, 2009 |
Privacy Still Dogs Electronic Health Records New study highlights security shortcomings with the ways medical facilities are digitizing patients' records.  |
The Motley Fool September 16, 2009 Tim Beyers |
The iPhone Is Still Bigger Than You Think 79% of 300 IT directors surveyed say their employees would prefer to use their own devices to access corporate networks than company-issued devices. Their overwhelming choice -- 82% of those surveyed -- was the iPhone.  |
InternetNews November 28, 2007 Andy Patrizio |
Report Details Real Costs of Data Breaches Some experts say breaches aren't just an embarrassment to your IT department: They're a leech on the bottom line.  |
InternetNews January 15, 2009 Richard Adhikari |
Does the State Dept. Ignore Security? UPDATED: Reports suggest an ongoing pattern of unauthorized access to citizens' personal information.  |
InternetNews January 22, 2007 Clint Boulton |
Microsoft's After The Lotus Notes Crowd Microsoft today introduced more free software tools to make it easier for customers of IBM's Lotus collaboration software to move to and work with Microsoft's competing SharePoint Services 3.0 suite.  |
Wall Street & Technology September 23, 2005 |
Basel II Falls Flat Despite increased efforts, banks are less certain about the benefits of Basel II compliance, according to a recent survey.  |
InternetNews November 6, 2008 Richard Adhikari |
Salesforce no Rival to SharePoint, Lotus Notes Should rivals be worried about Salesforce.com's move into Web site creation and hosting? Analysts are saying the news is no threat to established players like Lotus Notes and SharePoint.  |
Wall Street & Technology September 18, 2006 |
Enterprise Data Security Solutions: Variety Is the Spice of Life Enterprise data breaches continue to grab headlines and C-level attention. To combat the threat, companies are using a variety of technologies, according to a new survey of 802 IT executives.  |
InternetNews September 22, 2009 |
IBM Gives Lotus Connections a Web 2.0 Makeover IBM on Tuesday announced a series of new social networking tools and features for its Lotus Connections 2.5 software, giving users an opportunity to better customize and manage their collaborative enterprise applications.  |
InternetNews March 2, 2009 Richard Adhikari |
Microsoft Broadens Cloud Appeal at CeBIT Microsoft is rounding out its online productivity offerings - pitting it against perennial rivals.  |
InternetNews January 17, 2006 Clint Boulton |
Microsoft Collab Tool Could Woo IBM Set Microsoft is looking to be a thorn in IBM's side ahead of next week's Lotusphere event.  |
InternetNews December 5, 2007 Andy Patrizio |
How TJX Became a Lesson In Proper Security Retailers suddenly get religion about securing their networks when they see a $1 billion bill facing retailer TJX.  |
U.S. Banker September 2007 John Bingham |
Data Breaches' Sophistication Prompt 'Digital Dozen' Standards Taking measures to prevent and deter data breaches is the best approach to avoiding the high cost of fraud. Collaborations among Visa, MasterCard, American Express, Discover Card and JCB created a common industry security requirement known as the Payment Card Industry Data Security Standard.  |
Information Today May 2005 Phillip Britt |
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information.  |
Bank Systems & Technology November 17, 2009 Maria Bruno-Britz |
IT Execs Fear Retribution From Former Employees Ernst & Young's latest information security survey shows that senior IT executives feel their systems will need to be better monitored against attack from ex-employees.  |
Commercial Investment Real Estate Sep/Oct 2015 Alan Lyons |
Cyber Scares Protect your real estate business from online security breaches.  |
InternetNews July 18, 2005 Sean Michael Kerner |
FBI: Online Crime Losses Down, Attacks Up A new study from the FBI and the Computer Security Institute cites a dramatic drop in average losses from cybercrime, but a rise in web site incidents and unauthorized access incidents.  |