Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
The leak of 75,000 internal military logs on the Afghanistan war is a major IT security breach, but the fact that the breach - or leak - of such magnitude occurred didn't seem to surprise many. And, two recent reports show why.