MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 25, 2010
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. mark for My Articles similar articles
IEEE Spectrum
July 2011
Robert N. Charette
More Cyberattacks or Just More Media Attention? We've failed to take cybersecurity seriously. Now we're paying the piper mark for My Articles similar articles
CIO
October 15, 2003
Ben Worthen
Security Alerts New warning system taps security contractors for attack data mark for My Articles similar articles
CIO
October 14, 2011
James Niccolai
US Companies Pushed to Disclose Cyberattacks New guidelines from US regulators throw a spotlight on disclosure of cyber-incidents. mark for My Articles similar articles
CIO
October 15, 2003
Grant Gross
Regulation Congressman wants companies to report cyberdefense steps mark for My Articles similar articles
PC World
February 3, 2003
Paul Roberts
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. mark for My Articles similar articles
InternetNews
July 9, 2010
Obama Cyber Boss Talks Up Security Strategy Howard Schmidt explains the White House's new approach to improving security in cyberspace, cautioning that no silver bullet will solve the problem. mark for My Articles similar articles
CIO
April 25, 2014
Lucian Constantin
5 Things You Need to Know About Cybersecurity Insurance Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. mark for My Articles similar articles
CIO
April 27, 2015
Stephanie Overby
Boards are on high alert over security threats Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company's security posture and steer the conversation toward managing business risk. mark for My Articles similar articles