System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Monitoring
12 Oct 2014 Artificial Intelligence System can Predict Data Theft by Scanning Email [38736]
Network World, October 2nd, 2014

"Workers who may be tempted to sell confidential corporate data should think twice about what they write in an email - an AI-based monitoring system could be watching," warns Tim Hornyak in Network World.

"Tokyo-based data analysis company UBIC has developed an artificial intelligence system that scans messages for signs of potential plans to purloin data.

A risk prediction function is being added to an existing product from the company that audits email for signs of activity such as price fixing. The Lit i View Email Auditor has been used in electronic discovery procedures in U.S. lawsuits..."
(Get More Information . .) open to premium members only

02 Oct 2014 Artificial Intelligence System can Predict Data Theft by Scanning Email [38694]
Network World, October 2nd, 2014

"Workers who may be tempted to sell confidential corporate data should think twice about what they write in an email - an AI-based monitoring system could be watching.

Tokyo-based data analysis company UBIC has developed an artificial intelligence system that scans messages for signs of potential plans to purloin data.

A risk prediction function is being added to an existing product from the company that audits email for signs of activity such as price fixing. The Lit i View Email Auditor has been used in electronic discovery procedures in U.S. lawsuits..."
(Get More Information . .) open to premium members only

29 Sep 2014 The Best Open Source Networking and Security Software [38681]
IT World, September 29th, 2014

"There's no shortage of excellent open source networking and security tools, and we've celebrated them all at one time or another. (Hint: See previous Bossies roundups or, more recently, "7 killer open source monitoring tools.") Here we were aiming for new and fresh, or at least fresh to us, and for indispensible tools that notched a big release in the past year..."
(Get More Information . .) open to premium members only

22 Sep 2014 7 Killer open Source Monitoring Tools [38523]
IT World, September 22nd, 2014

"Network and system monitoring is a broad category. There are solutions that monitor for the proper operation of servers, network gear, and applications, and there are solutions that track the performance of those systems and devices, providing trending and analysis. Some tools will sound alarms and notifications when problems are detected, while others will even trigger actions to run when alarms sound. Here is a collection of open source solutions that aim to provide some or all of these capabilities..."
(Get More Information . .) open to premium members only

14 Sep 2014 11 Steps Attackers Took to Crack Target [38265]
Network World, September 2nd, 2014

Thor Olavsrud writes in Network World,"Aorato, a specialist in Active Directory monitoring and protection, delivers a step-by-step report on how attackers used the stolen credentials of an HVAC vendor to steal the data of 70 million customers and 40 million credit cards and debit cards from the retailer...

Despite the massive scale of the theft of Personal Identifiable Information (PII) and credit card and debit card data resulting from last year's data breach of retail titan Target, the company's PCI compliance program may have significantly reduced the scope of the damage, according to new research by security firm Aorato, which specializes in Active Directory monitoring and protection..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998

!-- end archive_section.tpl -->