MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 14, 2011
Oracle Tunes Up Database Security With Firewall In a bid to shore up the security of crucial IT assets, Oracle has unveiled its Database Firewall product, which seeks to guard against SQL injections and other database attacks. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
PC World
January 27, 2003
Williams et al.
Spread of Slammer Worm Slows Investigators are searching for the source of the worm that caused major disruptions to Internet service over the weekend. mark for My Articles similar articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles
InternetNews
April 20, 2004
Ryan Naraine
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. mark for My Articles similar articles
CIO
October 15, 2003
Paul Roberts
Virus Attacks What a month. Human frailty, spam and a dangerous Microsoft Windows vulnerability combined to produce four major Internet worm attacks in August. A rundown. mark for My Articles similar articles
InternetNews
May 7, 2004
Ryan Naraine
Analyst: Security Woes Add to Windows Cost Gartner's John Pescatore believes enterprises must include the cost of protecting Windows when considering alternatives. mark for My Articles similar articles
PC World
August 1, 2001
James Niccolai
Code Red Awakens With a Whimper Hyped worm appears to have little impact, but experts warn we aren't out of the woods yet... mark for My Articles similar articles
PC World
May 2003
Daniel Tynan
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
PC World
August 9, 2001
Joris Evers
Microsoft Sees Red: Worm Infects Its Own Servers Neglecting its own servers, Microsoft gets hit by the worm it urged customers to avoid... mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
InternetNews
September 28, 2010
Microsoft Preps Out-of-Band Patch for ASP.NET Microsoft's latest fix resolves encryption flaw in ASP.NET framework used to create new websites. mark for My Articles similar articles
PC Magazine
August 17, 2005
Sebastian Rupley
Beyond Viruses The cost to U.S. companies of doing battle with network attacks has fallen significantly. mark for My Articles similar articles
CIO
August 1, 2003
Bob Violino
Patching Things Up The latest patch management tools can help reduce costs and increase reliability. mark for My Articles similar articles
PC Magazine
November 11, 2003
The Lookout: New Critical RPC Flaws Nearly a month to the day after the Blaster worm began tearing through the Internet, Microsoft Corp. reported three newly identified flaws in the Windows RPC protocol, two of which are quite similar to the one that Blaster attacks. mark for My Articles similar articles
IEEE Spectrum
February 2011
David Schneider
Network Defense Gone Wrong One common distributed denial-of-service defense could in fact make a Web site more vulnerable mark for My Articles similar articles
InternetNews
September 1, 2004
Ryan Naraine
Oracle Patch Day: Critical Flaws Fixed Security patches released for multiple 'high risk' flaws in Oracle's enterprise-focused products. mark for My Articles similar articles
PC World
September 4, 2001
Kim Zetter
Did FBI Ignore Code Red Warning? Fast-spreading malicious worm may have had a less successful predecessor... mark for My Articles similar articles
InternetNews
April 28, 2004
Ryan Naraine
Blaster Redux? SSL Worm Threat Rising Security experts have spotted the first signs of a Blaster-like worm circulating underground, prompting fears that major Internet disruptions could be less than a week away. mark for My Articles similar articles
InternetNews
February 12, 2004
Ryan Naraine
MyDoom Ends but Open Ports Attracting Mutants Microsoft releases a virus removal tool, but unpatched drone machines are still a major threat. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
December 23, 2008
Sean Michael Kerner
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. mark for My Articles similar articles
Bio-IT World
May 9, 2003
Mark D. Uehling
Data Rapture? Electronic capture of data: Some say it unclogs the medieval clinical trials process. Others remain skeptical of software and put their trust in paper. mark for My Articles similar articles
InternetNews
April 12, 2005
Michael Singer
Oracle Security Updates Include PeopleSoft Fixes The company issued 15 separate patches for multiple security vulnerabilities, but older flaws still loom. mark for My Articles similar articles
InternetNews
August 18, 2005
Tim Gray
Warily Watching Worm Variants Versions of the Zotob worm continue to slam corporate networks while security vendors and Microsoft play defense. mark for My Articles similar articles
InternetNews
August 10, 2006
Andy Patrizio
To Patch Or Not To Patch? Microsoft issues a fix to a severe hole. The government insists we use it, but is there a risk? mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
Bio-IT World
July 2005
David Fishbach
Does EDC Herald the End of CTMS? Clinical trial managements systems (CTMSs) and Electronic data capture systems (EDCs) are compared with respect to their history, advantages and disadvantages. Studies suggest both have enough advantages to survive in some form of integrated solution. mark for My Articles similar articles
Entrepreneur
November 2003
Jane Easter Bahls
This Means War Put up your best fight to protect your network, or you could be held liable for damages to customers. mark for My Articles similar articles
PC World
January 28, 2003
Grant Gross
FAA: Slammer Didn't Hurt, But the Next One Might Agency says its air traffic control network wasn't compromised by worm's attack on the Internet, but admits it could happen in the future. mark for My Articles similar articles
Bio-IT World
April 2007
Deborah Borfitz
Fusion Makes the Difference at Oracle With Fusion, Oracle will begin combining the best features of its JD Edwards, Siebel, and E-Business Suite product lines to form a new collection of web-based applications based on service-oriented architecture. Many life science companies globally run Oracle applications. mark for My Articles similar articles
Bio-IT World
April 15, 2003
Paul Bleicher
E-Sourcing: Covering the Regulatory Bases Capturing clinical source data electronically can hit a home run for trial efficiency and safety -- but access control is key. Here's an expert guide. mark for My Articles similar articles
Pharmaceutical Executive
November 1, 2006
Unraveling the eSource Industry-wide standards for electronic patient data have long felt like buried treasure. Companies today are getting closer - by way of a tangled map. mark for My Articles similar articles
InternetNews
April 10, 2007
Andy Patrizio
Three Critical Fixes For Windows Microsoft releases three significant fixes for Windows, but Office remains exposed. mark for My Articles similar articles
InternetNews
November 18, 2004
Michael Singer
Major Security Patch Overhaul For Oracle Changes come after the growing number of complaints from customers and even its own executives. mark for My Articles similar articles
Pharmaceutical Executive
July 1, 2006
Jeannette Park
Roundtable: Are We There Yet? How About Now? Now? Can Electronic Data Capture become the industry standard for clinical trials? In this roundtable discussion, six early adopters reveal where they struggled, and what you need to know to implement this new technology. mark for My Articles similar articles
HBS Working Knowledge
June 30, 2003
Austin & Darby
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. mark for My Articles similar articles
InternetNews
May 9, 2006
Ed Sutherland
Microsoft Patches Critical Exchange, Flash Holes Microsoft released three patches - two deemed critical - covering vulnerabilities in Microsoft Exchange, Flash and Windows. mark for My Articles similar articles
PC World
September 19, 2001
Frank Thorsberg
Nimda Worm Continues Attack Security firms identify some damage in the wake of worm traveling the world by e-mail... mark for My Articles similar articles
InternetNews
April 13, 2004
Sharon Gaudin
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. mark for My Articles similar articles
InternetNews
May 26, 2004
Ryan Naraine
Korgo Worm Targets LSASS Flaw The detection of a new network worm is a clear indication that users have still not applied Microsoft's MS04-011 update. mark for My Articles similar articles
PC World
August 17, 2001
Andrew Brandt
Code Red Worm Crawls Again Here's how to protect your systems from the potential menace's monthly emergence... mark for My Articles similar articles
Bio-IT World
April 16, 2004
Joel Hoffman
Taking the Trial Out of Clinical Outsourcing Make sure the vendor's standard operating procedures will mesh with your own, and then tirelessly work toward systems integration. mark for My Articles similar articles
InternetNews
October 20, 2005
Jim Wagner
Slew of Patches From Oracle Oracle issued its latest batch of security patches affecting its software products Wednesday. mark for My Articles similar articles
InternetNews
December 23, 2003
Sharon Gaudin
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. mark for My Articles similar articles
T.H.E. Journal
September 2003
Roger Del Russo
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. mark for My Articles similar articles