MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Insurance & Technology
August 10, 2006
Anthony O'Donnell
The Road to Security Security is a journey - it is a constant and evolving discipline. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Peggy Bresnick Kendler
Virtual Roundtable: Online Risk Industry experts discuss how to manage the risks, liabilities, and solutions associated with electronic processes and interactions related to conducting business over the Internet. mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
Insurance & Technology
March 7, 2006
Peggy Bresnick Kendler
Who Goes There? Insurance industry executives discuss how controlling access to information through identity management is key to securing critical client and corporate data. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles
Bank Systems & Technology
February 18, 2009
Ashfield & Shroyer
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. mark for My Articles similar articles
Bank Systems & Technology
June 1, 2005
Deena M. Amato-McCoy
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats. mark for My Articles similar articles
Wall Street & Technology
August 27, 2004
Up Front Fraudsters Go Phishing... Things Are Looking Up... SOX on the Brain... mark for My Articles similar articles
Bank Systems & Technology
August 24, 2006
Peggy Bresnick Kendler
Identity Management Addressing the biggest threats to information security for banks. mark for My Articles similar articles
CIO
September 15, 2005
Scott Berinato
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Insurance & Technology
November 1, 2006
Maria Woehr
Message Mania For insurers, e-mail and instant messaging provide easy ways to share information with distributors and employees, communicate effectively with customers and agents, and help claims adjusters transfer files to turn around claims - all in real time. mark for My Articles similar articles
Insurance & Technology
March 16, 2004
Peggy Bresnick-Kendle
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. mark for My Articles similar articles
InternetNews
March 3, 2005
Roy Mark
New Senate Bill Looks to Hook Phishers The Anti-Phishing Act of 2005 targets both the e-mail bait and the Web site switch by entering two new crimes into the U.S. Code. mark for My Articles similar articles
Insurance & Technology
June 14, 2005
Wendy Toth
Securing Compliance: System, Project or Process? Database and application security products are growing in popularity as companies look for ways to keep up with regulatory demands like Sarbanes-Oxley. mark for My Articles similar articles
Registered Rep.
August 15, 2014
Diana Britton
Is the Cyber Sweep Too Much to Handle? The recent regulatory sweeps around cyber security by the Securities and Exchange Commission and FINRA are starting to hit financial advisors, and many, especially smaller practices, are not prepared for it. mark for My Articles similar articles
Inc.
March 2007
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. mark for My Articles similar articles
CIO
July 1, 2003
Alice Dragoon
Eight (Not So) Simple Steps to the HIPAA Finish Line While much of the new security rule is common sense, meeting it by the 2005 deadline won't be easy. Here's a checklist to ease your heartburn. mark for My Articles similar articles
Financial Planning
October 1, 2012
Less-Risky Business: Protecting your Financial Planning Firm from Fraud Deena Katz tells financial advisors 5 easy steps to protect your firm from fraud and software vulnerabilities mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
InternetNews
December 7, 2005
Roy Mark
Consumers Whistling Past the Security Graveyard Less than 20 percent of American home computers are adequately protected against viruses, spyware, hackers and other security threats. Nevertheless, an overwhelming majority of users believe they are safe from an attack. mark for My Articles similar articles
T.H.E. Journal
December 2002
Vincent Weafer
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. mark for My Articles similar articles
Wall Street & Technology
January 5, 2005
David Tan
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. mark for My Articles similar articles
T.H.E. Journal
August 2005
Irene Sandler
Road Warriors on Trojan Horses Ensuring end user compliance reduces the cost of network security. mark for My Articles similar articles
CIO
September 24, 2009
Matt Karlyn et al.
Identity Theft: 7 Tips for Complying with FTC Red Flag Rules The FTC's Red Flag Rules for reducing fraud due to identity theft take effect on November 1. Here's what you need to do to make sure you comply. mark for My Articles similar articles
Insurance & Technology
May 16, 2007
Peggy Bresnick Kendler
Effective Vendor Management Enables Insurance Companies to Get the Most Out of Software, IT Services and Outsourcing Contracts Questions and answers about insurer/vendor relationships. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
David Joachim
Q&A With Allstate Security Boss Kim Van Nostern An interview about how, in today's environment, it takes more than technical expertise to run a secure insurance enterprise. mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Peggy Bresnick Kendler
The Compliance Challenge Industry experts offer opinions on what the biggest challenges carriers currently face in terms of regulatory compliance. mark for My Articles similar articles
U.S. Banker
July 2003
Michael Grebb
If Bonnie and Clyde Only Knew... Bankers are working to shore up security efforts, particularly on-line breaches. But hacking a bank's network is too fun to forgo, making prevention that much harder. mark for My Articles similar articles
Bank Technology News
June 2003
Michael Grebb
Banks' Arsenal Grows Larger Fighting viruses, hackers and all things "e-vil" mark for My Articles similar articles
Bank Systems & Technology
November 29, 2004
Cynthia Ramsaran
Catch of the Day: Banks Face New Phishing Scams Newer and more intelligent phishing attacks target bank customers globally. mark for My Articles similar articles
InternetNews
November 23, 2009
IBM Outlines Top Security Trends for 2010 IBM's X-Force security team sees cyber crooks getting social and heading for the clouds. mark for My Articles similar articles
Insurance & Technology
June 16, 2004
Julie Gallagher
Look On the Bright Side Rather than letting the clouds of regulation rain on their operations, insurers that look for compliance's silver lining have an opportunity to improve their business processes. mark for My Articles similar articles
Pharmaceutical Executive
December 1, 2013
Slota et al.
Prescribed Behavior: Operating Under a Consent Decree For senior executives, meeting the requirements of a Consent Decree to the satisfaction of regulators is only half of the job. mark for My Articles similar articles
Wall Street & Technology
January 24, 2006
Cory Levine
A New View of Risk Only now are financial firms approaching the risk associated with their technology infrastructures as a business-critical initiative with substantial bottom-line implications and devoting greater resources to their maintenance. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
Security Here and There Foreign compliance vendors say security trumps privacy in the U.S. mark for My Articles similar articles
Insurance & Technology
January 5, 2007
Vincent Oliva
Take Risk Management and Compliance to the Next Level A seemingly never-ending wave of new compliance directives is perplexing insurance companies around the world, sowing confusion among insurers about how they should respond. mark for My Articles similar articles
Insurance & Technology
May 28, 2008
Nathan Conz
Insurers Taking More Unified Approach to Compliance Compliance is becoming the key component of core systems -- especially within the insurance industry. It means complying with state-to-state insurance regulations; but it also means establishing an anti-money laundering program. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Jack Milligan
Knee Deep in Regulation As part of the fallout from the latest financial crisis, bankers are wading through new layers of regulation while scanning for clearer skies ahead. mark for My Articles similar articles
Insurance & Technology
February 19, 2004
Anthony O'Donnell
Compliance as Opportunity Regulatory compliance demands force insurers to dedicate scarce resources, but meeting those demands can be the occasion to accomplish worthwhile IT goals. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
Defense Update
Issue 3, 2005
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. mark for My Articles similar articles
D-Lib
Sep/Oct 2012
Vermaaten et al.
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. mark for My Articles similar articles
National Defense
July 2007
Breanne Wagner
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. mark for My Articles similar articles
CFO
January 30, 2004
Esther Shein
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. mark for My Articles similar articles
Bank Technology News
April 2009
Rebecca Sausner
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. mark for My Articles similar articles