Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Although European Union leaders expressed concerns about the NSA's surveillance programs to President Obama, that didn't prevent the United States and EU from issuing a communique highlighting cooperation on cybersecurity.
Here's what to expect in the cybersecurity framework, a catalog of tools to be released Feb. 13 that's designed to help critical infrastructure owners develop information security protection programs.
In the past few months, the "Internet of Things" has gained more attention, and the cybersecurity and privacy implications are only beginning to be addressed in many quarters.
Days before the release of the Obama administration's cybersecurity framework, Senate Republicans issued a report detailing vulnerabilities in federal IT, suggesting the White House get its own house in order.
The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.
Cybercriminals exploiting weaknesses in how users employ passwords is a significant factor behind an increase in records exposed in breaches during 2013, says Craig Spiezle of the Online Trust Alliance.
A new, free iPhone app is designed to help organizations navigate 46 state data breach notification laws as well as federal statutes, such as HIPAA, attorney Scott Vernick says.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
A bill that backers say would fortify the IT security of the nation's critical infrastructure and government by codifying, strengthening and providing oversight of the mission of the DHS has cleared its first hurdle.
Undeterred, two senators will try again to get their colleagues to enact legislation that they contend would better safeguard sensitive information and notify consumers of a data breach when personally identifiable information is exposed.
Five significant trends, including the mobile revolution and the use of big data, will influence the future of cybersecurity, says Allan Friedman, co-author of a new book on the subject.
Federal agencies audited by the Government Accountability Office showed inconsistent responses to computer breaches involving personally identifiable information.
While preparing a speech to be delivered in Korea, NIST's Ron Ross wanted to convey the message of the importance of computer security. He hit on five themes - threat, assets, complexity, integration and trustworthiness - which form the acronym TACIT.
The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.
Randy Trzeciak and his CERT Insider Threat Center colleagues are working to broaden the definition of the insider threat to incorporate not just the risk to information and IT but to facilities and people, too.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.