MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
Global Services
May 27, 2007
Raj Chaturvedi
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. mark for My Articles similar articles
Bank Director
2nd Quarter 2010
Glascock & Gaulke
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. mark for My Articles similar articles
OCC Bulletin
November 1, 2001
Third-Party Relationships This bulletin provides guidance to national banks on managing the risks that may arise from their business relationships with third parties... mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
Insurance & Technology
August 10, 2006
Anthony O'Donnell
The Road to Security Security is a journey - it is a constant and evolving discipline. mark for My Articles similar articles
Information Today
May 2005
Phillip Britt
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
Registered Rep.
September 11, 2014
Megan Leonhardt
Cybersecurity Breaches Not Rare, Just Undetected A new study by the North American Securities Administrators Association found only 4 percent of small to mid-sized RIA firms have experienced a cybersecurity attack. mark for My Articles similar articles
CIO
September 15, 2002
Meridith Levinson
The Best Offense While most security dollars go to technology, CIOs in our exclusive survey say investments in staff -- and education efforts to guide them -- must back up that robust firewall. mark for My Articles similar articles
InternetNews
October 16, 2007
Andy Patrizio
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. mark for My Articles similar articles
Bank Technology News
April 2002
Amy Newell
Backup, Recovery and Beyond Sept. 11's terrorist attacks heightened awareness about data protection, and industry insiders recommend that financial institutions view the issues in both present and future terms... mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
InternetNews
January 14, 2010
Hacker Breaches N.Y. Bank Long Island bank notifying 8,000 customers that their accounts have been compromised. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
Bank Systems & Technology
November 3, 2003
Ivan Schneider
Information Security: Room for Improvement Financial institutions could do better, but the unique concerns of the industry will result in valuable lessons to share with other industries and government. mark for My Articles similar articles
IndustryWeek
March 1, 2006
Doug Bartholomew
Responding To Risk: Invisible Enemies Manufacturers must find ways to prevent electronic threats to their networks and data. mark for My Articles similar articles
Wall Street & Technology
April 26, 2007
Hoffman & Tyminski
From Financial Services CISO to Chief Information Management Office: Tackling 360 Degrees of Enterprise Protection As security threats constantly change and the scope of their role continues to grow, successful chief information security officers are becoming chief information management officers. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. mark for My Articles similar articles
InternetNews
June 6, 2009
Alex Goldman
Enterprise Security Should Be Better and Cheaper Dr. Peter Tippett says he has the data to disprove many myths that govern security best practices. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
Investment Advisor
September 2007
Victor Silva
Negotiating With Host Whether you are an RIA or a broker/dealer rep, make sure that your in-house or hosted e-mail solution not only meets the requirements of the regulator, but your business needs as well. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
PHONE+
November 16, 2009
Cara Sievers
Helping Customers Plan For Disaster MegaPath offers up business continuity planning checklist. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
CIO
March 15, 2002
Sarah D. Scalet
How to Plan for the Inevitable Knowing how to respond to a security incident can save companies time, money and even their reputation. Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started... mark for My Articles similar articles
CIO
April 15, 2004
Eric Knorr
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets mark for My Articles similar articles
Bank Technology News
February 2011
Ben Rothke
Back to Basics On IT Security As 2011 starts, the key to bank data security is to focus on both the security fundamentals and look to new technologies. mark for My Articles similar articles
Registered Rep.
August 16, 2013
Lauren Barack
Hackers At The Gate "FINRA expects cyber security to remain a regulatory focus for the foreseeable future," Susan Axelrod, FINRA's executive vice president for Regulatory Operations said at the PLI Seminar in October. mark for My Articles similar articles
National Defense
October 2015
Tim Larkins
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. mark for My Articles similar articles
Insurance & Technology
October 29, 2003
Ivan Schneider
IT Security: Room for Improvement Financial services companies could still do better, but the unique concerns of the industry will result in valuable lessons to share with other industries and government. mark for My Articles similar articles
PC Magazine
November 29, 2006
Robert Lemos
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. mark for My Articles similar articles
Commercial Investment Real Estate
Sep/Oct 2015
Alan Lyons
Cyber Scares Protect your real estate business from online security breaches. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
InternetNews
November 8, 2004
Jim Wagner
Report: A Misplaced Sense of Security? As many as 20 percent of big business networks admit to unauthorized breaches, yet many feel more secure. mark for My Articles similar articles
InternetNews
December 1, 2005
Sean Michael Kerner
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. mark for My Articles similar articles
CRM
September 7, 2012
Dale Dabbs
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. mark for My Articles similar articles
Searcher
October 2007
Paul S. Piper
Phish Pharming: A Newer, More Profitable Aquaculture Detecting e-mail scams. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
Bank Systems & Technology
December 1, 2005
Eileen Colkin Cuneo
Dealing With Data Theft After the Fact When a security breech occurs, a company handling it right can flip the negative into a positive and earn customers' respect and appreciation. If they handle it wrong, and the business will fight the stigma of being an untrustworthy organization indefinitely. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. mark for My Articles similar articles
CIO
February 24, 2014
How CIOs Prepare for the Worst Three CIOs discuss how a successful business continuity plan requires prioritization, awareness and testing mark for My Articles similar articles
Managed Care
November 2006
Ed Silverman
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? mark for My Articles similar articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
CIO
January 2007
Data Breaches Cost You More Data breaches continue to become more expensive. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
May 28, 2004
Sean Michael Kerner
Financial Firms in Hackers' Crosshairs A new survey says IT security attacks on financial institutions have doubled. mark for My Articles similar articles