Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Three senators discount suggestions their bill would empower the president to deny citizens Internet access. "Nothing could be further from the truth," say Sens. Joseph Lieberman, Susan Collins (both pictured) and Thomas Carper.
Securing data in the public cloud isn't much different from other types of IT security. "It's the same advice we give for almost any deployment of IT because it is still the right thing to do," NIST Senior Computer Scientist Tim Grance says.
The first of what should be a slew of bills aimed at safeguarding government IT and the nation's critical information infrastructure was introduced by Senate Majority Leader Harry Reid and the Democratic chairs of the seven committees with IT security oversight.
"Okay, we have bad guys that might be in the system, but at least we're watching them every minute and hopefully detecting them before they do anything too bad," RSA Chief Technology Officer Bret Hartman says.
Has an alleged Stuxnet attack on Iranian nuclear facilities entered the realm of warfare? It may not be a cyberwar, as defined by many experts, but it sure feels like one.
A rise in unemployment could be a harbinger of an improving economy, as discouraged individuals reentered the job market. Indeed, the IT workforce topped 4.12 million in the fourth quarter, a record high.
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Imagine drafting the top IT security minds into a defense force to protect the nation's critical IT infrastructure. Defense Minister Jaak Aaviksoo and other Estonian leaders mull the possibility of instituting such a draft.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
The National Institute of Standards and Technology issues two special publications: SP 800-119, Guidelines for the Secure Deployment of IPv6 and SP 800-135, Recommendation for Application-Specific Key Derivation Functions.
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.