Similar Articles |
|
PC World November 29, 2007 Lincoln Spector |
Why Can't I Send Outgoing E-Mail From a Friend's House? Sending e-mail from an outside location is harder than you might think. |
Entrepreneur October 2006 Melissa Campanelli |
Plug and Pay Credit cards aren't the only way to pay online these days. |
U.S. Banker May 2011 Rob Garver |
Another Stab at Federated Identity The administration is exploring an identity ecosystem that envisions universal Internet log-in credentials for consumers. Will the prospect of more secure e-commerce win banks over to the idea? |
The Motley Fool July 31, 2007 Tim Beyers |
Don't Be Deceived by These Numbers If ever a rule of thumb were made to be broken, it's this: Never invest in an unprofitable company. Here's a look at network security specialist Secure Computing. |
InternetNews July 13, 2010 |
RIM Preps BlackBerry Security App Research In Motion is preparing to offer a free secure backup service for its BlackBerry customers. |
CRM June 2015 Leonard Klie |
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information |
Information Today September 10, 2015 |
iMoneza Introduces New Revenue Stream for Publishers iMoneza, a secure micropayment gateway for digital media, announced the availability of its cloud-based solution to help publishers develop a new revenue stream. |
CRM October 13, 2015 Oren Smilansky |
Sparkcentral Launches Secure Authentication for Social Customer Support Message encryption functions aim to facilitate trusted service interactions on Twitter and Facebook. |
Bank Technology News March 2001 Maria Bruno |
IDshield Promises Authentication With a Twist -- Hardware Help Those in the market for a new system to secure their Web operations face a dilemma--how to authenticate without intruding upon the customer's privacy. Kenneth Bob, chief executive officer of Uniondale, NY-based Safewww Inc., thinks it's a no-brainer... |
PC Magazine April 30, 2009 Nicole Price Fasig |
Give Your Data a Safe Trip These secure hard drives will keep your files from falling into the wrong hands on the road. |
Bank Technology News March 2008 Rebecca Sausner |
The FutureNow List The FutureNow List recognizes ten companies that set themselves apart for the security innovations they bring to market, and the contribution these products will make to improving security within financial services organizations. |
Managed Care August 2007 |
E-mailing Doctors Desirable for Those with Comorbidities Patients who have multiple comorbidities and who take multiple medications may benefit most from a secure e-mail messaging system, according to a study. |
InternetNews March 3, 2006 Erin Joyce |
Neal Creighton, CEO, GeoTrust Digital certificate authority Neal Creighton sees a busy year dawning. The co-founder of GeoTrust explains why. |
InternetNews November 1, 2010 |
What the PCI-DSS 2.0 Security Standard Means What's new and what's still missing is the latest update to the security standard for payment and merchant systems? |
Bank Technology News July 2001 Louise West |
Bibit Gets Funding Despite Cash Squeeze The Dutch online payment service provider will use the funds to push into the United States... |
Bank Technology News November 2007 Glen Fest |
Online Authentication: Multifactor Race Nears Finish Line Nearly a year after half of all U.S. institutions missed the deadline to adopt stricter FFIEC guidelines for online authentication, analysts say that banks have finally, and almost universally, put their multifactor and other risk-mitigation layers in place. |
Investment Advisor October 2010 Dan Skiles |
Server Rack -- Don't Forget Physical Security Make sure that your server is secure enough that someone can't walk in and carry it out without much work. |
Bank Technology News February 2001 David Rountree |
For Retail Payment On The Net, Only Tradition Is Getting Traction Credit cards rule, to be sure, but bankers understand that the Internet is about choice... |
Wall Street & Technology June 13, 2006 |
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. |
Bank Technology News June 2004 Karen Krebsbach |
Firms Flirt with Out-of-Band Authentication Banks weigh whether this cumbersome technology is worth the bother for consumers, particularly for on-line banking. |
The Motley Fool February 5, 2008 Tim Beyers |
A Valentine for Secure Computing Secure Computing is a misunderstood stock, beating Wall Street estimates although the Street says otherwise. Investors, read on to see why. |
Information Today September 19, 2013 |
Precise Biometrics Builds Ecosystem for Mobile Device Security Precise Biometrics recently integrated its Tactivo products with a global ecosystem of technology partners that create authentication applications. |
Bank Technology News July 2008 Barry Cox |
Automating Management of the Branch Office Network Some financial services IT departments with high availability requirements and limited staff at distributed locations are turning toward a new remote management approach. |
CRM March 25, 2015 |
Good Technology Adds Data Security to Microsoft Dynamics CRM New version provides app-level security on corporate-owned or personal iPads. |
PC Magazine February 5, 2009 Joel Santo Domingo |
Lenovo ThinkPad USB Portable Secure Drive If you need to keep your data secure and portable, the Lenovo ThinkPad USB Portable Secure Drive is a simple-to-use option. |
Bank Technology News July 2011 |
The Real Mobile-Payment Risk Mobile payment providers, especially telecom network providers, need to work on security and education, and prove they're putting the right safeguards in place. |
National Defense May 2012 Stew Magnuson |
Boeing Sees Profits in Secure Mobile Phone Market The Boeing Co. is developing a mobile phone based on the Android operating system that will compete with other manufacturers offering highly secure communication devices, company officials said. |
InternetNews October 24, 2005 Tim Gray |
Companies Bid for Authentication Compliance Work Financial institutions are getting started on security compliance regulations. |
CIO June 29, 2011 |
Securing Data on All Devices How CIOs are keeping control of mobile security risks while providing users with their choice of devices. |
The Motley Fool April 9, 2008 Tim Beyers |
Don't Fear the Finjan Finjan Software has asked a court to bar Secure Computing from selling products it claims it has the patent on. But the fight isn't over yet. |
InternetNews May 7, 2010 |
Microsoft Strengthens SharePoint Security Two new products, Forefront Protection 2010 and Active Directory Federation Services 2.0, are designed to provide secure collaboration for users of Microsoft's SharePoint. |
InternetNews September 4, 2008 Richard Adhikari |
Secure Computing Says Securify the Right Fit Secure Computing announced the acquisition of Securify, which provides identity-based monitoring solutions tying user behavior on the network to business systems. |
Wall Street & Technology March 21, 2006 Paul Allen |
Add Another Bolt to the Cyber Door Due to enhanced and evolving cyber-threats, financial institutions now must implement some form of multifactor authentication or layered security to protect sensitive customer data. |
InternetNews February 14, 2006 Erin Joyce |
Microsoft, RSA, Sun And Encryption Business users and eventually consumers are moving closer to storing more of their digital identities and authentication on smart cards and USB devices. |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
Inc. February 2008 Ryan Underwood |
Remote Control The technologies that connect you to your office have gotten easier to use and more secure, whether you're manning your office desktop from afar or collaborating on projects via the Web. |
T.H.E. Journal June 2006 Doug Gale |
What's in a Name? In today's high-tech educational environment, the process of creating and securing network identities is more problematic than ever. |
InternetNews June 28, 2010 |
White House Talks Up Online ID Plan New framework aims to better secure user identities to battle online fraud. |
Financial Planning August 1, 2007 |
Practice Tips Successful financial planning firms understand the need to secure the next generation of clients (i.e., their heirs) to retain current assets and accumulate more in the future. |