RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20142014
Collapse AprilApril
Michaels Stores’ Breach Involved 3 Million Customers
Heartbleed Internet Security Flaw Used in Attack
Libraries Seek High-Speed Broadband
Study Finds No Evidence of Heartbleed Attacks Before the Bug Was Exposed
Scientists embark on unprecedented effort to connect millions of patient medical records
Promises of Preparedness Followed Devastating Earthquakes. And Yet.
Take Off the Blinders
Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say
Pay for Performance? It Depends on the Measuring Stick
Justice Stevens: The five extra words that can fix the Second Amendment
Sebelius Resigns After Troubles Over Health Site
Heartbleed bug puts the chaotic nature of the Internet under the magnifying glass
Banks Ordered to Add Capital to Limit Risks
‘Heartbleed bug’ threatens web traffic
Fort Hood Shooting Focuses Attention on Military Mental Health
Hackers Lurking in Vents and Soda Machines
The Wallet as Ethics Enforcer
Minding the Minders of G.M.
Military’s mental-health system faces shortage of providers, lack of good diagnostic tools
Technology's Man Problem
In a prying world, news organizations are struggling to encrypt their online products
G.M. Turns to Experienced Crisis Experts
Criminal Inquiry Said to Be Opened on Citigroup
Pentagon grapples to understand how yet another insider threat went undeterred
A Nudge on Digital Privacy Law From E.U. Official
Venture Capital | The Future of Money A Revolution in Money
Are Firefighters Spread Too Thin?
Building 21st-Century Cities Means Taking the Long View
Expand MarchMarch
Expand FebruaryFebruary
Expand JanuaryJanuary
Expand 20132013

Risk News

4/6/2012
Cyber-Criminals Change Tactics as Network Security Improves

"IBM in its X-Force security report for 2011 said security efforts have cut spam and improved vulnerability patching, but attackers are now targeting mobile devices and the cloud."

Annie's take:

This is a good summary of the IBM report, and highlights the need for information security professionals to establish the protections on their data before they move it to the cloud.