RSS subscription

Recent commentary
Skip Navigation Links.
Collapse 20152015
Collapse NovemberNovember
My Life as a Muslim in the West’s ‘Gray Zone’
What happens when cities and states try to prepare for self-driving cars
What happens when cities and states try to prepare for self-driving cars
Improper techniques, increased risks
U.S. cites errors and technical failures in report on Afghan hospital attack
The Morning Risk Report: The Bottom Line Benefits of Risk Management
Landing A Job In Cyber Security Doesn’t Get Easier Than This
Europe, Shaken by Paris Attacks, Weighs Security With Privacy Rights
The Ethical Challenges Facing Entrepreneurs
Stopping WhatsApp Won’t Stop Terrorists
Inside the surreal world of the Islamic State’s propaganda machine
Paris attacks: the immediate lessons
Britain hit by massive cyber-attack as Islamic State hackers launch assault against Anonymous
ISIS operates a crypto help desk – report
Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks
After Paris Attacks, Vilifying Refugees
French Security Left Blind During November 13 Paris Terror Attacks
French president calls Paris attacks ‘act of war’ by Islamic State
It’s Way Too Easy to Hack the Hospital
Opinion: For gender diversity in cybersecurity, fix the image problem
More cyber hires coming at DHS
Prosecutors Announce More Charges in Hacking of JPMorgan Chase
Federal judge rules that NSA’s data gathering ‘likely violates the Constitution’
Creating a Perfect Pitch
Prospect that bomb destroyed plane raises specter of expanding ISIS threat
Police Chiefs, Looking to Diversify Forces, Face Structural Hurdles
The Cyberthreat Under the Street
Cyber liability from perspective of board members and execs
Russia overtaking US in cyber-warfare capabilities
Rail Industry Had Safety Technology Decades Ago
How do you anonymize personal databases and protect people's privacy – over to you, NIST
SPD tech officer quits, files 200 more public-records requests
Expand OctoberOctober
Expand SeptemberSeptember
Expand AugustAugust
Expand JulyJuly
Expand JuneJune
Expand MayMay

Risk News

Cyber-Criminals Change Tactics as Network Security Improves

"IBM in its X-Force security report for 2011 said security efforts have cut spam and improved vulnerability patching, but attackers are now targeting mobile devices and the cloud."

Annie's take:

This is a good summary of the IBM report, and highlights the need for information security professionals to establish the protections on their data before they move it to the cloud.