RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20162016
Collapse AugustAugust
How to hack- and rig-proof U.S. elections
FBI: Common scanning tools used to target state election systems
NPPD still hopeful on infrastructure protection
Big data, Google and the end of free will
Deutsche Bank’s $10-Billion Scandal
The biggest threat facing connected autonomous vehicles is cybersecurity
Random hackers are taking NSA-linked cyber weapons for a test drive
Many hospitals transmit your health records unencrypted
Hints suggest an insider helped the NSA “Equation Group” hacking tools leak
'Imminent' terror attack on Britain stopped 'at the 11th hour'
NSA leak rattles cybersecurity industry
JPMorgan settles WaMu case against FDIC
Homeland Security Offering States Voting Cybersecurity Help
China Says Foreign Investors' Concern Over Its Cybersecurity Bill Is 'Unnecessary'
‘Shadow Brokers’ Leak Raises Alarming Question: Was the N.S.A. Hacked?
Trapwire surveillance system exposed in document leak
To curb radicalism, France targets foreign funding for mosques
Fractured Lands: How the Arab World Came Apart
Where in the world is my data and how secure is it?
Can the Centre Hold?
Delta Air Lines CEO Takes Responsibility for Outage
Political Cybersecurity Is Not a Partisan Issue
Security Screeners Cut Corners at Rio Games
Think Tank Scholar or Corporate Consultant? It Depends on the Day
Risks as Distractions
Researchers or Corporate Allies? Think Tanks Blur the Line
Apple Launches Bug Bounty with Maximum $200,000 Reward
Cyber-Protecting Critical Infrastructure Different than Protecting Data
How a Secretive Branch of ISIS Built a Global Network of Killers
Yahoo investigating claimed breach and data dump of 200 million users
How to attract a board-level cybersecurity expert
How vulnerable are our electronic voting systems to cyber attack?
Expand JulyJuly
Expand JuneJune
Expand MayMay
Expand AprilApril
Expand MarchMarch
Expand FebruaryFebruary

Risk News

4/6/2012
Cyber-Criminals Change Tactics as Network Security Improves

"IBM in its X-Force security report for 2011 said security efforts have cut spam and improved vulnerability patching, but attackers are now targeting mobile devices and the cloud."

Annie's take:

This is a good summary of the IBM report, and highlights the need for information security professionals to establish the protections on their data before they move it to the cloud.