Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
The National Cybersecurity Alliance's Michael Kaiser believes young people would seriously consider careers in IT security if they met role models like chief information security officers found throughout the country.
The Government Accountability Office is taking the White House to task for not demonstrating sufficient leadership in shepherding cybersecurity research and development.
A year ago, the info-tech workforce shrank by 145,000 individuals, but with hopes of new jobs, all but 3,000 of those lost professionals have returned to the IT workforce, according to our analysis of government employment statistics.
"The cloud is not such a special technology necessarily that it is exempt from a security perspective, but is just another implementation of IT, and is a natural evolution of where we come from," Federal CIO Vivek Kundra says.
Cybersecurity Coordinator Howard Schmidt unveils a White House blueprint to create an online environment where people and business can complete transactions in confidence.
DHS's Greg Schaffer tells the House Homeland Security Committee that the department would lead most responses to cyber attacks but definitive roles won't be determined until the administration completes a national incident response plan.
The Protecting Cyberspace as a National Asset Act also would replace paper-based FISMA compliance with continuous monitoring of technology systems and assaults by "friendly hackers" to test IT vulnerabilities.
"Operators of critical infrastructure could opt-in to a government-sponsored security regime," Deputy Secretary William Lynn III says. "Individual users who do not want to enroll could stay in the wild wild West of the unprotected Internet."
Veterans Affairs CIO tells a House panel that the VA has taken significant steps to prevent further IT security breaches that have plagued the agency, but auditors testify that the department faces alarming consequences because of a lack of security controls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.