RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20162016
Collapse SeptemberSeptember
ISACA programme aims to attract more women into technology professions
By Taking Back Money, Wells Fargo’s Board Seems to Recall Its Role
Yahoo sued for gross negligence over cyber-attack that exposed 500 million accounts
How Technology Has Transformed the Terrorist Threat Fifteen Years After 9/11
What the Hacking at Yahoo Means for Verizon
Wells Fargo Taps Law Firm Amid Calls for Pay Clawbacks
Wells Fargo Tests Justice Department’s Get-Tough Approach
US cities promise to crack down on police surveillance tech
Wells Fargo’s Board: ‘Not Acting Fast Enough’
Wells chief is 'deeply sorry'
How Long Until Hackers Start Faking Leaked Documents?
How Wells Fargo’s High-Pressure Sales Culture Spiraled Out of Control
New York Proposes ‘Flexible’ Cybersecurity Regulation for Insurers, Banks
The Feds Will Soon Be Able to Legally Hack Almost Anyone
Wells Fargo CEO Defends Bank Culture, Lays Blame With Bad Employees
New Wells Fargo Insurance Cyber Security Study Shows Companies More Concerned With Private Data Loss Than With Hackers
Staring Down the Bogeyman
What Happens After ISIS Falls?
A Walk Around the Void of 9/11
Wells Fargo to Pay $185 Million Fine Over Account Openings
Senate Staffers’ First Ever Cybersecurity Training Was Simple AF
How Baltimore Became America’s Laboratory for Spy Tech
Whom to Vote For? Employees Tend to Follow Their Leader
Election components as critical infrastructure
New cloud attack takes full control of virtual machines with little effort
Companies Back Microsoft’s Effort to Alert Users When Authorities Seek Their Data
FTC v. Wyndham and corporate cybersecurity
How agencies doubled the number of new cybersecurity hires this year
Expand AugustAugust
Expand JulyJuly
Expand JuneJune
Expand MayMay
Expand AprilApril
Expand MarchMarch

Risk News

3/14/2012
New Interest in Hacking as Threat to Security

"During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure, factories and databases, according to the Department of Homeland Security, compared with 11 over the same period a year ago."

Annie's take:

The gaps in security controls around critical infrastructure is becoming the focus of media and of Congress, with legislation of several types being introduced. We'll keep tracking this isue.