RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20152015
Collapse MayMay
Tech Rivalries Impede Digital Medical Record Sharing
Who’s the Watchdog? In Europe, the Answer Is Complicated
Map: The Islamic State’s disturbingly successful week
The Government’s Consumer Data Watchdog
ACLU Recommends New Rules for Police Body Cameras
Making Computer Science More Inviting: A Look at What Works
Up to 1.1 Million Customers Could be Affected in Data Breach at Insurer CareFirst
Tech giants don’t want Obama to give police access to encrypted phone data
5 Banks to Pay Billions and Plead Guilty in Currency and Interest Rate Cases
Snowden Sees Some Victories, From a Distance
Philadelphia’s Emergency Responders Describe Response to the Train Accident
Many on Wall Street Say It Remains Untamed
VA’s ability to increase health professionals is ‘seriously fractured’
Shareholders’ Votes Have Done Little to Curb Lavish Executive Pay
DHS employees receive awards for valor, some performed while off duty
Amtrak Train Derailed Going 106 M.P.H. on Sharp Curve; at Least 7 Killed
Amtrak Train Derails in Philadelphia, Killing at Least 6 and Injuring Dozens
Nepal Hit by Fresh Earthquakes
Influencing the Future
Veterans Battle for Jobs on the Home Front
N.S.A. Collection of Bulk Call Data Is Ruled Illegal
A resilient organization needs a specialist risk leader supporting the board
Lawmakers in France Move to Vastly Expand Surveillance
SEC Backlog Delays Whistleblower Awards
Hacked Firms Could Keep Quiet Under New U.S. Law
We have too little data to know how to help countries like Nepal recover from natural disasters
Patriot Act Faces Revisions Backed by Both Parties
Why the N.S.A. Isn’t Howling Over Restrictions
Expand AprilApril
Expand MarchMarch
Expand FebruaryFebruary
Expand JanuaryJanuary
Expand 20142014

Risk News

4/6/2012
Cyber-Criminals Change Tactics as Network Security Improves

"IBM in its X-Force security report for 2011 said security efforts have cut spam and improved vulnerability patching, but attackers are now targeting mobile devices and the cloud."

Annie's take:

This is a good summary of the IBM report, and highlights the need for information security professionals to establish the protections on their data before they move it to the cloud.