RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20142014
Collapse OctoberOctober
U.S. Plans 21-Day Watch of Travelers From Ebola-Hit Nations
How Ben Bradlee transformed The Washington Post
After JPMorgan Chase Breach, Push to Close Wall St. Security Gaps
Facebook Debuts Safety Check Feature for Disasters
USIS suffers another blow as GAO rules for competitor in wake of fraud allegations
Dozens Declared Free of Ebola Risk in Texas
How the microscopic Ebola virus kills thousands
Facebook unfriends federal drug agency
Experts Oppose Ebola Travel Ban, Saying It Would Cut Off Worst-Hit Countries
Obama May Name ‘Czar’ to Oversee Ebola Response
With New Ebola Case Confirmed, U.S. Vows Vigilance
Actually, flu is the virus you should really be worrying about
When Ebola Is a Workplace Issue
CDC chief: After Dallas nurse’s Ebola infection, U.S. must ‘rethink’ protocols
Ebola, ISIS, and Large Data Breaches: Is Operational Risk on the Rise?
Texas Health Worker Tests Positive for Ebola
Cloud Computing Cloud Computing Is Forcing a Reconsideration of Intellectual Property
Small drugmakers try to scale up to meet Ebola crisis
Newly Vigilant, U.S. Will Screen Fliers for Ebola
In Net Neutrality Discussion, Lawsuits Loom Large
Ethical choices surround a potential Ebola vaccine
Islamic State, murderer of journalists, releases 11 rules for journalists
Keeping Credit Cards and Bank Account Data from Hackers
We Want Privacy, but Can’t Stop Sharing
Dallas Ebola case spurs concern about hospital readiness
Hackers’ Attack Cracked 10 Financial Firms in Major Assault
Cyberattack Against JPMorgan Chase Affects 76 Million Households
Delay in Dallas Ebola Cleanup as Workers Balk at Task
The Fundamental Horror of ISIS
Ebola patient was allowed to leave Dallas hospital last week
Nigeria’s Actions Seem to Contain Ebola Outbreak
Expand SeptemberSeptember
Expand AugustAugust
Expand JulyJuly
Expand JuneJune
Expand MayMay
Expand AprilApril

Risk News

4/6/2012
Cyber-Criminals Change Tactics as Network Security Improves

"IBM in its X-Force security report for 2011 said security efforts have cut spam and improved vulnerability patching, but attackers are now targeting mobile devices and the cloud."

Annie's take:

This is a good summary of the IBM report, and highlights the need for information security professionals to establish the protections on their data before they move it to the cloud.