Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
"Until they personally suffer pain, they don't think it is something that can happen to them," says Eric Cole, an insider threat expert and SANS Institute faculty fellow.
What's embarrassing about the WikiLeaks episode isn't just the precarious position the publication of diplomatic cables put the U.S. in with its allies but the likelihood that one, low-level analyst accessed sensitive data without authorization and then leaked them.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
The conventional wisdom that Congress won't enact significant IT security legislation this year hasn't deterred some Democratic lawmakers, including House Homeland Security Committee Chair Bennie Thompson, from introducing another cybersecurity bill.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
House GOP members, including Texan Mike McCaul (pictured), are set to gain influence on IT security matters as they're poised to take over the chairmanships of key committees with cybersecurity oversight.
Could methods employed by the World Health Organization to quarantine people to prevent the spread of deadly diseases be a roadmap on how to prevent virtual viruses from spreading in the cyberworld?
"Signatures are not going to be the way of the future because we don't have time to put a name or a pattern on enemy behaviors and pass it out and block it," says Phyllis Schneck, McAfee chief technology officer/public sector.
Our analysis of Bureau of Labor Statistics data suggests that discouraged workers who stopped looking for information technology jobs at the height of the recession have returned to the workforce with hopes of landing new positions.
Investing in science, technology and math, not only will produce needed cybersecurity pros, but will generate stronger economic growth in the coming decade, says Patrick Gorman, former associate director of national intelligence.
The curious fact about cybersecurity legislation before Congress is that nearly everyone sees a need for it, and there's no partisan bickering, yet few people see a comprehensive federal information security bill becoming law this year.
Hospital association lawyer, Melissa Bianchi, testifying before a Senate panel seeks exemptions for healthcare providers from the bill's beach notification rules because they're already covered by HIPAA.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.