MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
Insurance & Technology
March 9, 2007
Anthony O'Donnell
In The Thick of IT: Chief Information Security Officers Address Broad Risk Management Concerns Privacy, regulatory compliance, identity management and access top today's insurance industry chief information security officers' concerns. mark for My Articles similar articles
InternetNews
January 24, 2006
Sean Michael Kerner
IBM: Users Are The Weak Link in Security IBM is warning in a new report that, though widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006. The culprit? Highly targeted attacks that rely on naive users to help perpetrate cybercrimes. mark for My Articles similar articles
Bank Technology News
September 2008
Tom Kellermann
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles
Wall Street & Technology
April 26, 2007
Hoffman & Tyminski
From Financial Services CISO to Chief Information Management Office: Tackling 360 Degrees of Enterprise Protection As security threats constantly change and the scope of their role continues to grow, successful chief information security officers are becoming chief information management officers. mark for My Articles similar articles
InternetNews
October 27, 2010
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
InternetNews
December 31, 2010
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. mark for My Articles similar articles
InternetNews
July 24, 2009
Are IT Security Journalists... Insecure? Are media professionals and organizations are vulnerable to IT security attacks? mark for My Articles similar articles
Chemistry World
June 10, 2015
Emma Stoye
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. mark for My Articles similar articles
InternetNews
October 31, 2007
Andy Patrizio
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. mark for My Articles similar articles