MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 8, 2008
Richard Adhikari
Obama Faces New Calls for Cybersecurity Revamp National security think tank pushes for new U.S. oversight and regulations to combat Internet threats. mark for My Articles similar articles
Information Today
December 20, 2010
Commerce Department Calls for 'Privacy Bill of Rights' The report outlines a dynamic framework to increase protection of consumers' commercial data and support innovation and evolving technology. The Department is seeking additional public comment on the plan. mark for My Articles similar articles
Information Today
August 6, 2012
Barbie E. Keiser
Cybersecurity and Privacy Concerns at the Highest Levels of Government Ensuring the privacy and security of personal information collected by federal government agencies and preventing cyberattacks in the future is a responsibility of government that all Americans can support. mark for My Articles similar articles
Bank Director
4th Quarter 2010
Mark D. Kotwick
Foreign Privacy Laws and the Cross Border Transfer of Information In an increasingly global financial world, it's helpful to have some basic knowledge about the rules and regs regarding international privacy law. mark for My Articles similar articles
National Defense
August 2012
Sandra I. Erwin
Cybersecurity Legislation: Solution or Distraction? After three years of debate and intense horse-trading, four major pieces of cybersecurity legislation have collided on Capitol Hill. Each claims to provide definitive policy and legal answers on how the United States should protect itself from crippling cyber-attacks. mark for My Articles similar articles
InternetNews
May 28, 2009
Kenneth Corbin
Momentum Builds for Updating Privacy Act Government, advocacy groups call for Congress and agencies to modernize the way citizens' personal information is handled. mark for My Articles similar articles
Managed Care
November 2006
Ed Silverman
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? mark for My Articles similar articles
U.S. Banker
March 2007
Paresh Amin
Balancing Industry Mandates and Federal Regulations Financial companies need to consider compliance, business objectives and data security in a holistic manner. All three can be boiled down to one main requirement: determining what is happening to critical data. mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
Information Today
October 20, 2015
Barbie E. Keiser
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. mark for My Articles similar articles
PC World
September 18, 2002
Peggy Watt
Uncle Sam Wants You to Defend Cyberspace National cybersecurity plan unveiled for comment, criticism, suggestions. mark for My Articles similar articles
Information Today
March 29, 2012
FTC Recommends Best Practices for Consumer Privacy Protection The final report sets forth best practices for businesses to protect the privacy of American consumers and to give them greater control over the collection and use of their personal data. mark for My Articles similar articles
National Defense
October 2012
Stew Magnuson
Party Platforms Have Little to Say About Homeland Security Republicans and Democrats released their party platforms at their respective conventions this summer. Neither had much to say about homeland defense. In fact, the Department of Homeland Security was not invoked in either document. mark for My Articles similar articles
National Defense
February 2016
Chris Wiedemann
Finance, Health Care, Agriculture Play Key Roles in Critical Infrastructure Protection Anyone looking to support the mission of critical infrastructure protection outside of DHS should be reaching out to the Departments of Treasury, Health and Human Services, and Agriculture. mark for My Articles similar articles
InternetNews
February 6, 2007
Roy Mark
Concealment a Crime in Latest Data Breach Bill Additional legislation calls for criminal penalties for concealing breaches and consumer notification of 'significant' breaches. mark for My Articles similar articles
Information Today
November 7, 2013
George H. Pike
U.S. Government Releases Proposed Cybersecurity Framework The Obama administration is taking public comments on a proposed framework for improving cybersecurity in communication and other critical industries. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
CIO
April 25, 2014
Lucian Constantin
5 Things You Need to Know About Cybersecurity Insurance Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles
Bank Technology News
November 2001
David Rountree
Taking Care of Customer Data A privacy breach in the banking industry may carry ominous legal ramifications, but they pale in comparison to the effects of a blown reputation... mark for My Articles similar articles
Information Today
May 3, 2012
Paula J. Hane
Online Consumer Privacy in the Spotlight Choose Privacy Week is being held May 1-7, 2012. The theme is "Freedom from Surveillance." The American Library Association's Office for Intellectual Freedom established Choose Privacy Week to deepen public awareness about this issue. The event is timely with many privacy issues like CISPA in the news. mark for My Articles similar articles
Information Today
February 2002
Richard Poynder
Paying the Price for Security Information technology and the Internet -- so the mantra goes -- offer significant cost savings, efficiency improvements, and substantial social benefits. Such assumptions, however, are increasingly being questioned... mark for My Articles similar articles
National Defense
January 2014
Stew Magnuson
New Cyber Framework Aimed at Small, Mid-Tier Defense Companies A National Institute of Standards and Technology framework intended to help companies and organizations bolster their cybersecurity may have a big impact for small- and mid-tier defense contractors, experts said. mark for My Articles similar articles
CIO
June 13, 2011
Bill Bulkeley
What CFOs Care About Besides Your IT Budget CFOs need to understand more than the costs and financial benefits to adopting cloud and consumer technologies. They're also on the hook to protect against risk mark for My Articles similar articles
Registered Rep.
September 11, 2014
Megan Leonhardt
Cybersecurity Breaches Not Rare, Just Undetected A new study by the North American Securities Administrators Association found only 4 percent of small to mid-sized RIA firms have experienced a cybersecurity attack. mark for My Articles similar articles
InternetNews
March 19, 2010
Senate Cybersecurity Bill Back in Play Lawmakers have reintroduced bipartisan cybersecurity legislation to the Senate, stripping out controversial provisions that alarmed privacy advocates and civil libertarians. mark for My Articles similar articles
InternetNews
May 29, 2009
Kenneth Corbin
Obama Moves Cybersecurity into the White House The president calls for a White House cybersecurity coordinator -- and reports that his own campaign was breached. mark for My Articles similar articles
Wall Street & Technology
March 2, 2004
Brendon Lynch
Web-Privacy Management Increases in Importance An organization's reputation is increasingly at risk online. Financial-services firms, in particular, are constantly updating their Web sites to provide readily accessible information, services and products to their customers and provide a high degree of visibility for the company and its brands.. mark for My Articles similar articles
National Defense
August 2011
Zhen Zhang
Cohesive Cybersecurity Policy Needed For Electric Grid Securing the electric grid is one of the key components of preventing terrorist attacks in the United States and increasing the country's resilience and recovery from such events. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
InternetNews
July 1, 2009
Kenneth Corbin
U.S. Official: Cybersecurity Plans Not Just Talk NSC Cybersecurity Director Christopher Painter promises real action to protect digital infrastructure after Obama's address. mark for My Articles similar articles
Bank Technology News
January 2006
Glen Fest
Data Breach Notification: States Differ On When To Sound The Alarm Legislative action on how and when banks should sound the alarm when there's been a data breach has lagged on the federal level, leading to a broad mix of state measures. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
Security Here and There Foreign compliance vendors say security trumps privacy in the U.S. mark for My Articles similar articles
National Defense
June 2011
Stew Magnuson
When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues Most experts seem to agree that the U.S. government's collective efforts to secure the Internet from large-scale attacks and other nefarious activities are lacking. mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
Financial Planning
April 1, 2010
Brian Hamburger
Full Disclosure Protecting client privacy is one of the most important responsibilities of any financial advisor. And it's about to become one of the most time-consuming and highly regulated aspects of the business as well. mark for My Articles similar articles
PC World
October 7, 2002
Michelle Madigan
Privacy Concerns Pushed to Front Lines Feds must explore, explain any effect on privacy by new policies or practices, under pending legislation. mark for My Articles similar articles
Bank Systems & Technology
February 5, 2009
Maria Bruno-Britz
Deloitte Says Financial Crisis May Lead to Security Crisis for Banks Problems with liquidity and customer retention aren't the only challenges that banks will face in 2009. The pressures brought on by the financial crisis are actually increasing banks' vulnerabilities to data breaches. mark for My Articles similar articles
InternetNews
August 30, 2006
Clint Boulton
AT&T to Offer Credit Checks After Data Hack AT&T will pay for credit monitoring services after 19,000 credit card numbers were stolen. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Gartner: Firms Still Playing Catch-Up With Privacy Budget shortfalls, tangled international laws stymie enterprise privacy operations. mark for My Articles similar articles
CIO
June 29, 2009
Kim S. Nash
Obama's Cybersecurity Coordinator Has Broad Agenda President Obama's review of cybernet security needs provides a long list of issues to address. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Jody Westby
Building an Enterprise Security Program Key to Managing Risks Insurance companies are particularly vulnerable to cyber risks because they house so much sensitive data. mark for My Articles similar articles
CIO
October 1, 2012
Kenneth Corbin
European Union Outlines New Cloud Strategy, Draws Praise in U.S. European authorities outline a proposal for a single set of rules to harmonize cloud computing among member states, with an eye toward a substantial economic boost. mark for My Articles similar articles
CIO
April 15, 2002
Daintry Duffy
Continental Divide While Europe has adopted strict privacy regulations, U.S. companies are still collecting and trading their customers' info like it's going out of style. If Simon Davies has his way, it will... mark for My Articles similar articles
CIO
July 29, 2015
Heidi Shey
Data privacy is now a competitive differentiator How you handle confidential data may spell the difference between consumer loyalty and business disaster. mark for My Articles similar articles
InternetNews
May 29, 2009
Kenneth Corbin
Obama's Cybersecurity Mandate a Bold First Step Obama's long-awaited cybersecurity announcement raises the profile of the issue, but many challenges remain. mark for My Articles similar articles
InternetNews
May 28, 2009
Kenneth Corbin
Counting Down to White House Cyber Czar As the time draws near, many questions remain about how Obama will shake up government cybersecurity. mark for My Articles similar articles
CIO
June 14, 2011
Kim S. Nash
Why CIOs Should Care About Privacy Customers will judge your company's competence according to how well you protect their data, says Don Peppers, co-founder of customer relationship advisory firm Peppers & Rogers Group. CIOs are on the front line. mark for My Articles similar articles
InternetNews
January 21, 2009
Richard Adhikari
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. mark for My Articles similar articles
InternetNews
April 7, 2008
Judy Mottl
Storage: The New Frontier in Data Protection It's no longer all about the perimeter, says NetApp's Tim Russell at Storage Network World: Instead, IT needs to focus on storage as costs and regulations mount. mark for My Articles similar articles