MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
September 28, 2010
Microsoft Drops Patch for ASP.NET Zero Day Flaw Microsoft makes good on its promise to deliver an out-of-band patch for a zero day security exploit that had been shown capable of compromising server encryption. mark for My Articles similar articles
InternetNews
March 30, 2010
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. mark for My Articles similar articles
PC World
September 2004
Laurianne McLaughlin
Smart Talk Time for a new cell phone, service plan or both? Use this guide to pick the perfect ones for your needs and budget. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
PC Magazine
March 6, 2007
Sascha Segan
Unlock Your Phone A recent Copyright Office ruling gave the thumbs-up to unlocking cell phones, including the GSM phones that are used by Cingular, T-Mobile, and most of the rest of the world outside the U.S. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
InternetNews
September 23, 2005
Sean Michael Kerner
Credit Companies Tighten Encryption Equifax, Experian and TransUnion create a new standard to securing sensitive customer data. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles