MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 8, 2010
The Biggest Security Breaches of 2009 There were some spectacular data breaches last year. Here's some of the best, or worst, depending on your perspective. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
InternetNews
April 12, 2005
Tim Gray
310,000 Exposed by LexisNexis Data Breach Company estimates data breach affected 10 times the U.S. residents as originally reported. mark for My Articles similar articles
InternetNews
June 9, 2009
Alex Goldman
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? mark for My Articles similar articles
InternetNews
March 17, 2006
Roy Mark
Groups Slam Data Breach Notification Bill A U.S. House panel effort to write a national data breach disclosure law is running into fierce opposition by consumer groups calling the legislation the "worst data security bill ever." mark for My Articles similar articles
InternetNews
December 20, 2005
Jim Wagner
Guidance Software Investigating Stolen Data Computer forensic specialist Guidance Software found itself on the receiving end of a malicious hacking attack that managed to swipe sensitive information on reportedly thousands of customers. mark for My Articles similar articles
InternetNews
December 21, 2009
Hacker Breaches College Library System Incident compromises more than sensitive information of more than 51,000 patrons at 25 campus libraries. mark for My Articles similar articles
CIO
March 15, 2002
Sarah D. Scalet
How to Plan for the Inevitable Knowing how to respond to a security incident can save companies time, money and even their reputation. Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started... mark for My Articles similar articles
InternetNews
May 11, 2009
Alex Goldman
UC Berkeley Says Hackers Breached Database Officials at the University of California at Berkeley on Friday began notifying students and the public that hackers had breached a healthcare database at the school, potentially gaining access to the personal information of up to 160,000 students dating back to 1999. mark for My Articles similar articles
PC Magazine
July 10, 2003
Sebastian Rupley
California's Two-Fisted Privacy Stance A new state identity-theft law actually extends far beyond the state. mark for My Articles similar articles
Commercial Investment Real Estate
Sep/Oct 2015
Alan Lyons
Cyber Scares Protect your real estate business from online security breaches. mark for My Articles similar articles
Bank Technology News
September 2008
Anthony Malakian
Budgets Inch Up The top priorities for bank security spending are fraud detection for money transfers and an AML system, followed by fraud detection for online banking. mark for My Articles similar articles
InternetNews
November 25, 2008
Richard Adhikari
Mainframe Breach at LensCrafters Parent Hits 59K Eyewear giant Luxottica Group becomes the latest in a string of high-profile data leaks. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
InternetNews
June 25, 2010
Anthem Blue Cross Victim of Data Breach More than 230,000 Social Security numbers and medical records are accidentally exposed due to some sloppy programming. mark for My Articles similar articles
Managed Care
November 2006
Ed Silverman
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? mark for My Articles similar articles
InternetNews
February 10, 2010
New Hack Attack Tags Payroll Processor Payroll processing giant Ceridian is warning some of its customers that a hacker managed to access its Internet system in December, exposing the personal data of more than 27,000 workers. mark for My Articles similar articles
InternetNews
February 6, 2007
Roy Mark
Concealment a Crime in Latest Data Breach Bill Additional legislation calls for criminal penalties for concealing breaches and consumer notification of 'significant' breaches. mark for My Articles similar articles
CIO
January 1, 2002
Sarah D. Scalet
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. mark for My Articles similar articles
PC World
July 30, 2001
Ashlee Vance
Hack Attack Targets Verizon, AT&T Wireless Users' Social Security numbers and other personal data may have been exposed online... mark for My Articles similar articles
InternetNews
September 29, 2005
Tim Gray
Another University System Suffers Breach Crackers continue to exploit American universities' computer weaknesses. mark for My Articles similar articles
InternetNews
July 20, 2005
Tim Gray
Hackers Head to School in Droves Universities appear to be the new favorite target of hackers, as the University of Southern California becomes the latest to get hit. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
May 18, 2009
Kenneth Corbin
Questions for Obama's CTO Appointment As Aneesh Chopra heads for his confirmation hearing next week, his newly created role is a definition in progress. mark for My Articles similar articles
InternetNews
October 20, 2009
Privacy Still Dogs Electronic Health Records New study highlights security shortcomings with the ways medical facilities are digitizing patients' records. mark for My Articles similar articles
InternetNews
November 28, 2007
Andy Patrizio
Report Details Real Costs of Data Breaches Some experts say breaches aren't just an embarrassment to your IT department: They're a leech on the bottom line. mark for My Articles similar articles
InternetNews
May 1, 2009
Kenneth Corbin
Twitter's Security Woes Continue Celebrity profiles exposed as hacker gains access to Twitter's admin account. mark for My Articles similar articles
InternetNews
October 21, 2004
Roy Mark
Calif. Warns Residents of Possible ID Theft State officials warned California residents Wednesday to take preventative steps against ID theft after an unknown hacker gained access to a database at the University of California, Berkeley. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2006
Gregg Keizer
Cleanup Costs Much More Than Encryption: Gartner Protecting customer records is much less expensive than paying for cleanup after a data breach or massive records loss, according to Stamford, Conn.-based Gartner. mark for My Articles similar articles
InternetNews
December 12, 2006
David Needle
UCLA Database Hole Exposed 800,000 to ID Theft UCLA Web site touted the school's IT security the same day it discovered hackers had broken into its computer system. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Hacker May Have Hit Over 97K at Univ. of Florida Why do people keep launching cyber attacks at the home of the Gators? mark for My Articles similar articles
The Motley Fool
June 13, 2006
Tim Beyers
ID Theft: When Will It End? This time, the Energy Department blows it. So what should have happened? Here's what to do if you think your ID has been compromised. mark for My Articles similar articles
Investment Advisor
March 1, 2011
Lewis Schiff
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. mark for My Articles similar articles
InternetNews
January 5, 2010
Hacker Hits Eastern Washington University Colleges continue to be popular targets for hackers, with another 130,000 student records exposed. mark for My Articles similar articles
InternetNews
March 4, 2005
Clint Boulton
ChoicePoint Stops Selling Some of Your Info ChoicePoint scales back its business after a major database breach that exposed the personal information of 145,000 people. Lawmakers are taking action. mark for My Articles similar articles
InternetNews
January 21, 2009
Richard Adhikari
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. mark for My Articles similar articles
InternetNews
January 19, 2010
Lincoln Financial Breach Puts 1.2M Users at Risk The financial services company admitted last week that the sharing of usernames and passwords among employees created a security breach that compromised more than 1.2 million customers' personal data. mark for My Articles similar articles
The Motley Fool
August 30, 2006
Rich Smith
AT&T Gets Touched The epidemic of data thefts continues. A hacker broke into AT&T's computer system, accessing the credit card data of roughly 19,000 customers who had previously used the company's online store to purchase DSL equipment. mark for My Articles similar articles
InternetNews
January 13, 2005
Jim Wagner
T-Mobile Investigating Alleged Hacker The Secret Service has joined T-Mobile to find out the damage caused by a network breach. mark for My Articles similar articles
U.S. Banker
June 2007
Rebecca Sausner
Cyber Security: Insurance Not Standard Yet, But Choices Abound Typical policies now offer a range of protections, as data breaches become more problematic. But at what point should premiums be spent instead on shoring up security? mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
InternetNews
January 14, 2010
Hacker Breaches N.Y. Bank Long Island bank notifying 8,000 customers that their accounts have been compromised. mark for My Articles similar articles
InternetNews
May 8, 2009
Alex Goldman
Heartland Hit With $12M Breach Tab The credit card payment processor is disputing fines from MasterCard and Visa, but the security breach turned what would have been a profitable quarter into a loss. mark for My Articles similar articles