MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 23, 2004
Colin C. Haley
Security Outsourcing to Soar Enterprises will contract out 90 percent of security operations by 2010, Yankee Group predicts. mark for My Articles similar articles
InternetNews
February 20, 2004
Michael Singer
Security Forces to Show Unified Front Homeland Security officials will join experts from Microsoft and other IT firms in San Francisco next week to address the onslaught of malicious attacks. mark for My Articles similar articles
InternetNews
April 8, 2008
David Needle
Chertoff Calls For Private Sector to Help Secure 'Net At the RSA conference, the homeland security chief lays out an agenda requiring corporate and individual participation. But is it money well spent? mark for My Articles similar articles
InternetNews
March 4, 2010
DHS Chief: Security Requires Faster Response Department of Homeland Security Secretary Janet Napolitano told security experts and media that while many great ideas have been suggested, less talk and more action is needed to safeguard government and corporate networks. mark for My Articles similar articles
The Motley Fool
October 21, 2004
Tom Taulli
Our Money, Our Lost Identities There are many threats to our pocketbooks in the online world. Entrust's plan to put a stop to it can have a big impact for e-commerce. The company posted revenues of $21.3 million, which was a 6% increase from the same period a year ago. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
Popular Mechanics
April 17, 2008
Joe Pappalardo
Hack Attack on Tibet Groups Could Hint at China's Anti-U.S. Tactic As Buddhist monks in exile mourn fellow Tibetans killed in the recent conflict with China, U.S.-based nonprofit organizations are facing spam attacks, fake smear campaigns and other threats to digital privacy. mark for My Articles similar articles
InternetNews
February 9, 2007
Clint Boulton
RSA Reminds Us to Fight The Good Fight There is no bullet-proof way to outmaneuver people who want your data. But we need to try. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
InternetNews
January 14, 2004
Sharon Gaudin
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. mark for My Articles similar articles
InternetNews
February 17, 2005
Michael Singer
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. mark for My Articles similar articles
Bank Technology News
May 1, 2008
Rebecca Sausner
Homeland Security: Manhattan Project for Cyber Sec The federal government has begun to offer details on an expensive, and targeted, defensive cyber-security plan to protect our nation's financial markets. mark for My Articles similar articles
National Defense
October 2007
Breanne Wagner
Computer Crimes Keep Government and Industry on the Defensive The complexity of new malicious code and the elusive nature of cyber attackers have become significant impediments to detecting or preventing most intrusions. mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
PC Magazine
August 17, 2005
Sebastian Rupley
Beyond Viruses The cost to U.S. companies of doing battle with network attacks has fallen significantly. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
InternetNews
February 17, 2011
RSA: Security Experts Debate Cyberwar Threat From corporate espionage to WikiLeaks, experts at the RSA conference debate the challenge of maintaining computer security. mark for My Articles similar articles
InternetNews
February 24, 2010
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. mark for My Articles similar articles
InternetNews
December 7, 2004
Roy Mark
Execs Call for Tighter Cyber Security Control Security alliance claims White House and DHS are not doing enough to protect against cyber attacks. mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
InternetNews
January 6, 2004
Robyn Greenspan
The Deadly Duo: Spam and Viruses, December 2003 High growth rates and record-breakers are usually celebrated, but not when it comes to spam and viruses. The spam volume rose from 42 percent of e-mail to 58 percent during 2003, and the year fell just short of being the worst on record for malware variants. mark for My Articles similar articles
IEEE Spectrum
April 2006
Prachi Patel-Predd
Cybercrime At A Glance But just how much damage can cybercrime cause? About $67 billion to U.S. companies last year, according to an estimate based on the Federal Bureau of Investigation's 2005 Computer Crime Survey. Here's more statistics. mark for My Articles similar articles
InternetNews
April 1, 2004
Susan Kuchinskas
The Red, White and Blue of Spam Nothing has changed since the Federal Can-Spam Act became law except that more of it seems to becoming from the U.S., according to one industry player's report. mark for My Articles similar articles
InternetNews
July 19, 2007
Roy Mark
DoJ Sends ID Theft Bill to Congress The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
InternetNews
February 17, 2011
McAfee, RSA Widen Security Partnership At the annual RSA conference, the eponymous sponsor jointly announces with McAfee that the two outfits would further combine their security technologies to develop integrated solutions. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
An Imperfect (Cyber) Storm The federal government has been working with private companies and security vendors to develop protocols and communications systems that will let them respond quickly and share relevant information on threats and attacks. mark for My Articles similar articles
InternetNews
December 13, 2005
Roy Mark
Cyber Security Group Flunks Washington Neither the Bush administration nor Congress is providing significant leadership or legislation to secure the United States against cyber attacks, the Cyber Security Industry Alliance charged Tuesday. mark for My Articles similar articles
National Defense
September 2009
Grace V. Jean
In The Fight Against Cybercrime, Weapons Have Short Shelf Lives Even the latest innovations to protect U.S. networks are not enough to counter cybercrimes. mark for My Articles similar articles
InternetNews
January 28, 2010
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. mark for My Articles similar articles
CIO
November 1, 2005
Matt Villano
Seeing No Evil CIOs are growing increasingly frustrated at the laissez-faire attitude of many ISPs toward security. Is it time to consider regulating the ISP industry? mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
InternetNews
October 18, 2005
Roy Mark
Congress Raises Cyber Security Awareness In response to an NCSA report, Congress highlights woeful online protection measures by American consumers. mark for My Articles similar articles
InternetNews
September 23, 2005
Roy Mark
Senate Turns Attention to Data Privacy The Senate Judiciary Committee expects to vote next week on legislation making it a crime for data brokers to conceal a security breach involving personal data and increasing penalties for computer fraud when the act involves personal data. mark for My Articles similar articles
InternetNews
April 23, 2007
Roy Mark
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. mark for My Articles similar articles
National Defense
February 2013
Stew Magnuson
DHS Pushes Back REAL ID Deadline Again to Accomodate Cash-Strapped States The Department of Homeland Security moved the goal posts back in December again when it granted a third extension for 37 states to comply with the REAL ID Act of 2005. mark for My Articles similar articles
HBS Working Knowledge
October 20, 2003
Wendy Guild Swearingen
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A mark for My Articles similar articles
InternetNews
January 28, 2004
Ryan Naraine
Gov't Rolls Out Cyber Alert System The federal government's cyber-security division unveils a new unit to serve as a clearinghouse of data on malicious hacking and virus threats against computer systems. mark for My Articles similar articles
InternetNews
June 4, 2007
Clint Boulton
Vendors Buy in For Consumer, Corporate Protection EMC, McAfee and VeriSign demonstrate their commitment to IT security in time for the Gartner IT Security Summit. mark for My Articles similar articles
National Defense
February 2011
Lawrence P. Farrell Jr.
To Improve Cyber-Security, U.S. Needs Cohesive Public-Private Partnership NDIA member companies recently put together a white paper on the necessity to better acquire and field cyber-capabilities. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
PC Magazine
December 9, 2003
Phishing for Online IDs Spam and viruses are enough to worry about, but now online fraud is reaching epidemic proportions. mark for My Articles similar articles
InternetNews
February 7, 2007
Clint Boulton
RSA Grows Its Data Protection Mix RSA, EMC's security division, moved to expand its strategy for securing encryption endpoints in corporate networks by agreeing to purchase Valyd Software Private Ltd. for an undisclosed sum. mark for My Articles similar articles
InternetNews
October 9, 2009
Larry Barrett
Cyber Terrorism Demands New Tactics: Study RAND Corporation says fighting online threats to national security requires nontraditional tactics, immediate attention. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
InternetNews
February 10, 2006
Roy Mark
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. mark for My Articles similar articles
Inc.
October 2005
John Fried
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. mark for My Articles similar articles
InternetNews
March 5, 2010
FBI Director Seeks Industry Help on Cybersecurity In an address at the annual RSA show, FBI Director Robert Mueller outlines challenges the agency has in fighting cyber crime, seeks broader partnerships with private-sector firms. mark for My Articles similar articles