Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Congress should consider enacting legislation allowing the government to regulate how the private sector handles and stores data to battle the growing problem of data breaches, Rep. Yvette Clarke says.
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
What's the information security, privacy and risk management repercussions of net neutrality? Perhaps, something significant; most likely, not much at all.
Little wonder that Howard Schmidt's name is on every list of prospective White House cybersecurity czar. In the field of IT security, Schmidt has done it all.
He spent more than 30 years in public service, including a stint as a White House special adviser on cyberspace security and as chief strategist for the...
A public-private consortium seeks to identify 10,000 young Americans who have the skills and aptitude to fill the top ranks of IT security practitioners and researchers in future years.
Hackers launched the attacks on White House, Pentagon and other institutions from a botnet that has command and control computers in multiple countries, including the United States.
Government websites in the United States and South Korea have been attacked, and the South Korean government believes North Korea is behind these virtual assaults.
On Capitol Hill, expert witnesses testify about the need to beef up graduate-level education, not only to train needed cybersecurity professionals, but prepare the PhDs and others needed to educate IT security specialists. But just outside the Beltway that encircles Washington, community colleges - hoping to tap...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.