MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Wall Street & Technology
February 25, 2008
Melanie Rodier
Ineffective Access Management Poses Risk to Businesses A new study shows that the majority of IT professionals view collaboration among business units and audit, compliance and IT security functions as critical to achieving good access management, but most feel it isn't happening. mark for My Articles similar articles
InternetNews
December 8, 2008
Richard Adhikari
Survey Finds Data Breaches Hit Most Enterprises Despite the growing number of data breaches reported by U.S. businesses, corporate database security is still not up to scratch. Yet many admins and senior management still feel confident in their security precautions. mark for My Articles similar articles
InternetNews
May 7, 2010
Microsoft Strengthens SharePoint Security Two new products, Forefront Protection 2010 and Active Directory Federation Services 2.0, are designed to provide secure collaboration for users of Microsoft's SharePoint. mark for My Articles similar articles
Bank Technology News
March 2007
Holly Sraeel
Protecting Data Online Is a Top Priority for Consumers Today, consumers recognize that fraud is no laughing matter. According to a study, 41% of respondents would decrease their use of online banking or switch institutions in the wake of a data breach. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
InternetNews
August 18, 2009
Enterprise App Developers Use Insecure Data Credit card numbers, customer information, and even employee records are inadequately protected in development environments, according to a new report. mark for My Articles similar articles
InternetNews
January 5, 2009
Richard Adhikari
The Dangers of Web Access As companies rely more heavily on the Web in their move toward Enterprise 2.0, they face an increasing number of security and network problems. mark for My Articles similar articles
Bank Technology News
September 2008
Anthony Malakian
Budgets Inch Up The top priorities for bank security spending are fraud detection for money transfers and an AML system, followed by fraud detection for online banking. mark for My Articles similar articles
Bank Systems & Technology
November 3, 2003
Ivan Schneider
Information Security: Room for Improvement Financial institutions could do better, but the unique concerns of the industry will result in valuable lessons to share with other industries and government. mark for My Articles similar articles
Bank Technology News
April 2009
Rebecca Sausner
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. mark for My Articles similar articles
InternetNews
October 15, 2008
Richard Adhikari
Microsoft SharePoint Ecosystem Growing Third-party vendors do well feeding off Microsoft, but enterprises may need to keep an eye peeled for new developments. mark for My Articles similar articles
InternetNews
October 1, 2004
Sean Michael Kerner
SOA Investments on The Rise, Yankee Says A new survey by Yankee Group finds that enterprises are embracing service oriented architectures in their networks at a much swifter pace. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Study: Negligence Causes Most Data Breaches A just-released study concludes that the cost of data breaches to businesses is rising from both internal negligence and the actions of third parties. mark for My Articles similar articles
Bank Systems & Technology
February 5, 2009
Maria Bruno-Britz
Deloitte Says Financial Crisis May Lead to Security Crisis for Banks Problems with liquidity and customer retention aren't the only challenges that banks will face in 2009. The pressures brought on by the financial crisis are actually increasing banks' vulnerabilities to data breaches. mark for My Articles similar articles
InternetNews
August 7, 2009
Facebook Moving Up Fast in the Enterprise Study reveals growing use of Facebook, but watch out for Microsoft and IBM. Brand loyalty, customer service, customer loyalty and acquisition were the top benefits noted. mark for My Articles similar articles
Insurance & Technology
October 29, 2003
Ivan Schneider
IT Security: Room for Improvement Financial services companies could still do better, but the unique concerns of the industry will result in valuable lessons to share with other industries and government. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
InternetNews
March 9, 2011
Data Breach Recovery Getting More Expensive Report says the cost enterprises have to pay to fix security and restore operations after a data breach continue to grow. mark for My Articles similar articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
InternetNews
November 8, 2004
Jim Wagner
Report: A Misplaced Sense of Security? As many as 20 percent of big business networks admit to unauthorized breaches, yet many feel more secure. mark for My Articles similar articles
Wall Street & Technology
March 1, 2004
Institutions Find it Tough to Meet Sarbox Deadline As the first deadline for Sarbanes-Oxley compliance of June 15 nears, financial-institutions are finding that complying is more difficult than they had anticipated mark for My Articles similar articles
BusinessWeek
April 18, 2005
"IBM Isn't Doing That Much" Microsoft's chairman says when it comes to productivity software, his company "has to push the frontiers on our own." mark for My Articles similar articles
IndustryWeek
January 1, 2007
Jonathan Katz
Intellectual Property: Feeling A Little Insecure? Hiring of information security professionals grows. mark for My Articles similar articles
InternetNews
May 11, 2010
SharePoint Could Shape Firms' Office 2010 Plans SharePoint collaboration server heads for next release with a host of new features Microsoft is pitching to enterprise clients. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
InternetNews
October 29, 2008
Sean Michael Kerner
Security Problem? Blame the Human Element Cisco study finds that security policies are often not respected by end users. mark for My Articles similar articles
CIO
October 15, 2008
Jarina D'Auria
Security Breaches: Three Tools for Preventing Data Loss Protecting against data loss from security breaches requires a combination of tools to secure networks, systems, and data. mark for My Articles similar articles
Bank Systems & Technology
March 30, 2007
J. Nicholas Hoover
Adoption of Web 2.0 Is Taking Off, But Some Firms Are Still Reluctant Business technologists are concerned about security, return on investment and their staffs' skill in implementing and integrating new Web tools. While some financial services companies are plunging into Enterprise 2.0, it still is an emerging technology. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. mark for My Articles similar articles
InternetNews
July 8, 2010
SharePoint Deployments Lack Planning: Study Research finds that while the number of SharePoint deployments are growing, those efforts aren't always properly planned. mark for My Articles similar articles
CIO
September 28, 2011
George V. Hulme
Are CIOs Too Cocky About Security? The vast majority of tech and business execs are overconfident about their security policies. mark for My Articles similar articles
InternetNews
February 10, 2009
Richard Adhikari
Microsoft Ties SharePoint to Enterprise Search Microsoft takes another whack at enterprise search by leveraging its highly popular SharePoint server. mark for My Articles similar articles
InternetNews
May 12, 2010
Stuart J. Johnston
Microsoft SharePoint Key to Office 2010 Rollout In what it describes as a one-two punch, Microsoft is betting big on the enterprise with the twin rollouts of SharePoint and Office 2010, hoping that the collaboration server will drive sales of the productivity suite. mark for My Articles similar articles
InternetNews
October 20, 2009
Privacy Still Dogs Electronic Health Records New study highlights security shortcomings with the ways medical facilities are digitizing patients' records. mark for My Articles similar articles
The Motley Fool
September 16, 2009
Tim Beyers
The iPhone Is Still Bigger Than You Think 79% of 300 IT directors surveyed say their employees would prefer to use their own devices to access corporate networks than company-issued devices. Their overwhelming choice -- 82% of those surveyed -- was the iPhone. mark for My Articles similar articles
InternetNews
November 28, 2007
Andy Patrizio
Report Details Real Costs of Data Breaches Some experts say breaches aren't just an embarrassment to your IT department: They're a leech on the bottom line. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Does the State Dept. Ignore Security? UPDATED: Reports suggest an ongoing pattern of unauthorized access to citizens' personal information. mark for My Articles similar articles
InternetNews
January 22, 2007
Clint Boulton
Microsoft's After The Lotus Notes Crowd Microsoft today introduced more free software tools to make it easier for customers of IBM's Lotus collaboration software to move to and work with Microsoft's competing SharePoint Services 3.0 suite. mark for My Articles similar articles
Wall Street & Technology
September 23, 2005
Basel II Falls Flat Despite increased efforts, banks are less certain about the benefits of Basel II compliance, according to a recent survey. mark for My Articles similar articles
InternetNews
November 6, 2008
Richard Adhikari
Salesforce no Rival to SharePoint, Lotus Notes Should rivals be worried about Salesforce.com's move into Web site creation and hosting? Analysts are saying the news is no threat to established players like Lotus Notes and SharePoint. mark for My Articles similar articles
Wall Street & Technology
September 18, 2006
Enterprise Data Security Solutions: Variety Is the Spice of Life Enterprise data breaches continue to grab headlines and C-level attention. To combat the threat, companies are using a variety of technologies, according to a new survey of 802 IT executives. mark for My Articles similar articles
InternetNews
September 22, 2009
IBM Gives Lotus Connections a Web 2.0 Makeover IBM on Tuesday announced a series of new social networking tools and features for its Lotus Connections 2.5 software, giving users an opportunity to better customize and manage their collaborative enterprise applications. mark for My Articles similar articles
InternetNews
March 2, 2009
Richard Adhikari
Microsoft Broadens Cloud Appeal at CeBIT Microsoft is rounding out its online productivity offerings - pitting it against perennial rivals. mark for My Articles similar articles
InternetNews
January 17, 2006
Clint Boulton
Microsoft Collab Tool Could Woo IBM Set Microsoft is looking to be a thorn in IBM's side ahead of next week's Lotusphere event. mark for My Articles similar articles
InternetNews
December 5, 2007
Andy Patrizio
How TJX Became a Lesson In Proper Security Retailers suddenly get religion about securing their networks when they see a $1 billion bill facing retailer TJX. mark for My Articles similar articles
U.S. Banker
September 2007
John Bingham
Data Breaches' Sophistication Prompt 'Digital Dozen' Standards Taking measures to prevent and deter data breaches is the best approach to avoiding the high cost of fraud. Collaborations among Visa, MasterCard, American Express, Discover Card and JCB created a common industry security requirement known as the Payment Card Industry Data Security Standard. mark for My Articles similar articles
Information Today
May 2005
Phillip Britt
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. mark for My Articles similar articles
Bank Systems & Technology
November 17, 2009
Maria Bruno-Britz
IT Execs Fear Retribution From Former Employees Ernst & Young's latest information security survey shows that senior IT executives feel their systems will need to be better monitored against attack from ex-employees. mark for My Articles similar articles
Commercial Investment Real Estate
Sep/Oct 2015
Alan Lyons
Cyber Scares Protect your real estate business from online security breaches. mark for My Articles similar articles
InternetNews
July 18, 2005
Sean Michael Kerner
FBI: Online Crime Losses Down, Attacks Up A new study from the FBI and the Computer Security Institute cites a dramatic drop in average losses from cybercrime, but a rise in web site incidents and unauthorized access incidents. mark for My Articles similar articles