NOT FOR REPRINT
Page Printed from: propertycasualty360.com/author/profile/chris-strohm/
The owner of the cargo ship involved in Baltimore's bridge disaster declared 'general average.'
While the government's efforts were great, they also underscored the difficulty in going after those behind cyberattacks.
The three countries have conducted sophisticated, large-scale hacking attacks across multiple U.S. industries.
The FBI has taken over the probe into a deadly plane crash near the Hartford-Brainard Airport in Connecticut after investigators determined it appeared to be deliberate, rather than the result of an accident.
Internet-connected and driverless cars could be targets for hackers so the auto industry must ensure vehicles have built-in cyber security protection, a top U.S. Justice Department official said.
Hacker based in Iran allegedly gained remote access to a computer controlling the Bowman Avenue Dams flood-control structure.
Hackers linked to the Iranian government launched cyber-attacks on some four dozen U.S. financial institutions and a flood-control dam above New York City in forays meant to undermine U.S. markets and national security.
A key figure is missing in the court documents outlining the biggest computer attack ever of the U.S. financial system: the actual hacker.
The U.S. Defense Department is sending personnel on tours with private cyber security companies and bringing in specialists from those companies to gain the skills necessary to defend military networks from hackers.
The U.S. and China announced agreement on broad anti-hacking principles aimed at stopping the theft of corporate trade secrets.
{ "author": { "name": "Chris Strohm", "webUrl": "/author/profile/chris-strohm/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 31, "social": [], "articles": [ { "uri": "/2024/04/16/cargo-owners-may-bear-portion-of-damages-from-baltimore-bridge-accident/", "title": "Cargo owners may bear portion of damages from Baltimore bridge accident", "byline": "Chris Strohm", "kicker": "News", "prettyDate": "April 16, 2024", "timeToRead": "3 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2024/04/Baltimore-bridge-general-average.jpg", "width": "767", "height": "633" }, "authors": [ { "webUrl": "/author/profile/chris-strohm/", "name": "Chris Strohm" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The owner of the cargo ship involved in Baltimore's bridge disaster declared 'general average.'", "body": null }, { "uri": "/2021/06/08/fbi-recoups-most-of-colonial-pipelines-bitcoin-cyber-ransom/", "title": "FBI recoups most of Colonial Pipeline's bitcoin cyber ransom", "byline": "Chris Strohm and Alyza Sebenius", "kicker": "News", "prettyDate": "June 08, 2021", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/06/Colonial-Pipeline-Bloomberg.jpg", "width": "620", "height": "372" }, "authors": [ { "webUrl": "/author/profile/chris-strohm/", "name": "Chris Strohm" }, { "webUrl": "/author/profile/alyza-sebenius/", "name": "Alyza Sebenius" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "While the government's efforts were great, they also underscored the difficulty in going after those behind cyberattacks.", "body": null }, { "uri": "/2018/07/26/china-russia-iran-top-cyber-threats-u-s-intelligence-finds/", "title": "China, Russia, Iran top cyber threats, U.S. intelligence finds", "byline": "Chris Strohm", "kicker": "News", "prettyDate": "July 26, 2018", "timeToRead": "3 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2018/07/cyber-hacker-laptop-bloomberg247388058_4.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/chris-strohm/", "name": "Chris Strohm" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The three countries have conducted sophisticated, large-scale hacking attacks across multiple U.S. industries.", "body": null }, { "uri": "/2016/10/12/fbi-to-take-lead-investigating-deadly-east-hartfor/", "title": "FBI to take lead investigating deadly East Hartford plane crash", "byline": "Chris Strohm, Alan Levin", "kicker": "News", "prettyDate": "October 12, 2016", "timeToRead": "2 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/chris-strohm-alan-levin/", "name": "Chris Strohm, Alan Levin" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The FBI has taken over the probe into a deadly plane crash near the Hartford-Brainard Airport in Connecticut after investigators determined it appeared to be deliberate, rather than the result of an accident.", "body": null }, { "uri": "/2016/04/12/internet-connected-cars-a-hacker-magnet-u-s-official-says/", "title": "Internet-connected cars a hacker magnet, U.S. official says", "byline": "Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "April 12, 2016", "timeToRead": "3 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/chris-strohm-bloomberg/", "name": "Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Internet-connected and driverless cars could be targets for hackers so the auto industry must ensure vehicles have built-in cyber security protection, a top U.S. Justice Department official said.", "body": null }, { "uri": "/2016/03/30/new-yorks-little-dam-sends-super-sized-warning-of-cyber-attacks/", "title": "New York’s little dam sends super-sized warning of cyber-attacks", "byline": "Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "March 30, 2016", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/chris-strohm-bloomberg/", "name": "Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Hacker based in Iran allegedly gained remote access to a computer controlling the Bowman Avenue Dams flood-control structure.", "body": null }, { "uri": "/2016/03/24/iranians-hacked-from-wall-street-to-new-york-dam-u/", "title": "Iranians hacked from Wall Street to New York dam, U.S. says", "byline": "Erik Larson, Patricia Hurtado, Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "March 24, 2016", "timeToRead": "6 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/erik-larson-patricia-hurtado-chris-strohm-bloomberg/", "name": "Erik Larson, Patricia Hurtado, Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "Hackers linked to the Iranian government launched cyber-attacks on some four dozen U.S. financial institutions and a flood-control dam above New York City in forays meant to undermine U.S. markets and national security.", "body": null }, { "uri": "/2015/11/13/mystery-remains-of-who-had-fingers-on-keyboard-in-jpmorgan-hack/", "title": "Mystery remains of who had fingers on keyboard in JPMorgan hack", "byline": "Michael Riley, Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "November 13, 2015", "timeToRead": "7 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/michael-riley-chris-strohm-bloomberg/", "name": "Michael Riley, Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "A key figure is missing in the court documents outlining the biggest computer attack ever of the U.S. financial system: the actual hacker.", "body": null }, { "uri": "/2015/10/29/pentagon-creates-cyber-security-exchange-program-with-industry/", "title": "Pentagon creates cyber security exchange program with industry", "byline": "Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "October 29, 2015", "timeToRead": "2 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/chris-strohm-bloomberg/", "name": "Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The U.S. Defense Department is sending personnel on tours with private cyber security companies and bringing in specialists from those companies to gain the skills necessary to defend military networks from hackers.", "body": null }, { "uri": "/2015/09/25/obama-says-u-s-china-agree-to-curb-hacking-company-secrets/", "title": "Obama says U.S., China agree to curb hacking company secrets", "byline": "Margaret Talev, Bloomberg, Chris Strohm, Bloomberg", "kicker": "News", "prettyDate": "September 25, 2015", "timeToRead": "2 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/margaret-talev-bloomberg-chris-strohm-bloomberg/", "name": "Margaret Talev, Bloomberg, Chris Strohm, Bloomberg" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "summary": "The U.S. and China announced agreement on broad anti-hacking principles aimed at stopping the theft of corporate trade secrets.", "body": null } ] } }
From gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download Resource