Similar Articles |
|
Insurance & Technology July 19, 2004 Peggy Bresnick Kendler |
Victory Over Viruses? Insurers must rely on a combination of tools - such as e-mail filters and firewalls - training and common sense to safeguard their systems and their operations from viruses and worms. |
Insurance & Technology March 16, 2004 Peggy Bresnick-Kendle |
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
InternetNews April 1, 2004 Sharon Gaudin |
Study: Virus Attacks Up But Infections Hold Steady Last year more -- and more dangerous -- viruses raced across the Internet than ever, according to a new study. But there was a glimmer of good news. |
HBS Working Knowledge October 20, 2003 Wendy Guild Swearingen |
New Rules for Information Security In a new book from Harvard Business School Press, Digital Defense, Thomas J. Parenty explains how security technologies are changing the rules of business. Plus: Q&A |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
Knowledge@Wharton September 10, 2003 |
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. |
PC Magazine July 13, 2004 Alexandra Robbins |
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. |
T.H.E. Journal April 2004 Judith Rajala |
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. |
PC World December 2000 Kim Zetter |
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... |
PC Magazine June 22, 2004 Robert P. Lipschutz |
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |
T.H.E. Journal February 2001 |
Symantec's Norton Anti-Virus 2000 Statistics illustrate how important it is for schools to protect their investment in computers by utilizing anti-virus software such as Symantec's Norton Anti-Virus 2000... |
T.H.E. Journal April 2004 |
NetCleanse, Spam Sleuth Protect From Viruses and Spam Solutions for protection from viruses and spam that promise to eliminate computer vulnerabilities. |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? |
Bank Technology News August 2006 Michael Sisk |
Roving Trouble The use of handheld devices in financial services provides the freedom to work remotely and can increase employee productivity, but there's a downside: Securing email access to corporate server-based accounts and providing remote access to corporate networks and Web-based email is harder than ever. |
Unix Insider January 2001 Sandra Henry-Stocker |
Understanding viruses What exactly is a virus, how does it work, and how can you protect your system from one? The author explains the difference between viruses and worms, and why keeping up with and preventing them is so difficult... |
PC World October 13, 2000 Kim Zetter |
How It Works: Viruses They're the "common cold" for computers; we'll show you how they operate and how to protect your PC... |
T.H.E. Journal April 2004 |
Security Leaders Launch Initiative to Combat Emerging Threats An industrywide collaboration led by Cisco Systems Inc. is trying to limit damage from emerging security threats such as viruses and worms. |
InternetNews January 14, 2004 Sharon Gaudin |
Last Year's Security Problems May Balloon in 2004 If 2003 was the worst year in history for viruses and spam, hold onto your hat. This year, according to security experts, is setting up to see the malicious problems that appeared last year grow and fester into major security problems for 2004. |
PC World September 2001 Sean Captain |
Stealth Fighters Today's best antivirus programs are tough on PC parasites but easy on users... |
Bank Systems & Technology May 7, 2007 Peggy Bresnick Kendler |
Bank Tech Experts Discuss Vendor Relationships Here, these industry experts talk about outsourcing and offshoring along with other areas of bank tech concerns. |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... |
PC Magazine November 25, 2003 |
Under Attack! If you're not running software to protect your PC, you should be! We test 12 products that will protect your PC and those with which it shares cyberspace. |
InternetNews December 23, 2003 Sharon Gaudin |
2003 'Worst Year Ever' for Viruses, Worms In no other year have computer viruses and worms wreaked so much havoc and caused so much damage as in this past year, according to security analysts. |
Technology Research News December 17, 2003 Kimberly Patch |
Device guards Net against viruses Ordinary computers have no chance of being able to monitor the huge volumes of traffic flowing through the Internet. Specialized hardware, however, can. A device is poised to serve as a network sentry, scanning the full contents of every packet for signs of viruses and the like. |
PC Magazine August 3, 2005 |
The Ten Biggest Problems in Computing and How We'll Solve Them Malicious computer attacks will go on, but you can be confident we'll get better at fighting them. |
Food Engineering June 1, 2005 Kevin T. Higgins |
Automation's Achilles' Heel Food plant engineers may shrug with indifference at the issue of controls-system security. But while networked systems, remote diagnostics and processing-floor visibility offer great benefits, the enabling technology can be a gateway for malicious intent. |
Inc. October 2005 John Fried |
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. |
T.H.E. Journal November 2001 Sharon Ruckman |
Computer Parasitology: 8 Proactive Steps for Protection Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure. Here are eight proactive steps your institution can take for protection... |
T.H.E. Journal April 2005 Jackson Ratcliffe |
Dominican U. Secures Network to Protect Students and Faculty Dominican University of California takes steps to combat worms, viruses and spyware. |
InternetNews March 31, 2005 Tim Gray |
Symantec Fixes Security Holes The firm releases fixes for two vulnerabilities found in its anti-virus products. |
PC Magazine September 15, 2004 Neil J. Rubenking |
Norton vs. McAfee: Top Antivirus Apps Square Off The best antivirus apps distinguish themselves by adding features outside the ordinary, features that give them additional power against attack by viruses, worms, or Trojans. |
Insurance & Technology November 17, 2004 Wendy Toth |
A Human Approach A recent study found that more than 70 percent of respondents failed to list training and raising employee awareness of information security as a top initiative. Yet communication among management may be the best security asset. |
InternetNews March 4, 2005 Jim Wagner |
Viruses Gearing up For The Smart Set As the boundaries between cell phones and desktop functionality blur, the danger of a worldwide wireless virus increases. |
Insurance & Technology October 29, 2003 George V. Hulme |
Summer Viruses Keep IT Security Busy The high cost of installing patches raises questions about the Microsoft platform. |
PC World August 12, 2002 Tom Mainelli |
Symantec Unveils Automated Norton AntiVirus Updated program zaps latest worms, seeks out instant messaging nasties, and doesn't bother you with the details. |
InternetNews August 6, 2004 Roy Mark |
Trojan Horse Charges PDAs First known backdoor attack on handhelds probably written by Russian virus coder. |
Bank Systems & Technology February 26, 2007 Peggy Bresnick Kendler |
New E-Discovery Rules Pose Challenges for Banks Banks need to focus on putting policies in place to govern electronic information, say experts. |
InternetNews May 28, 2004 Sean Michael Kerner |
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. |
T.H.E. Journal August 2005 Irene Sandler |
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. |
PC World December 17, 2001 Russell Pavlicek |
Is Linux Immune to E-Mail Viruses? Immunity is impossible, but the open-source operating system may be protected... |
PC World January 2003 Stan Miastkowski |
Step-By-Step: Set Antivirus Software for Maximum Protection Activate crucial settings to ensure that your system is completely protected. |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. |
CIO July 15, 2001 Mark Gembicki |
The Safety Dance A freelance technology strategist answers readers' questions on security and virus protection... |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
PC World August 21, 2001 Sam Costello |
Norton AntiVirus 2002 to Fight E-Mail Worms Symantec's latest antivirus tool scans e-mail attachments for unwanted viruses... |
New Architect May 2002 Sarah Gordon |
Distributing Viruses Should virus writers be allowed to post harmful code on the Web? |
Insurance & Technology July 19, 2004 Julie Gallagher |
Security Attacks Double More awareness, savvy perpetrators contribute to reported increase in attacks on IT systems of financial institutions. |