Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
The Department of Homeland Security launches a aimed to furnish stakeholders and the public with easy accessible information in securing the nation's critical infrastructures and key resources.
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
Army Biometrics Taskforce Director Myra Gray sees biometrics as the best identifier of individuals but shouldn't be employed alone as means to shield people's identities from those who would cause harm.
Interview with Myra Gray, Director, U.S. Army Biometrics Task Force
Though fingerprint and iris scans have advantages over passwords and magnetic identity cards as a means to grant access to IT systems, in many instances, the biometric technologies aren't ready to be employed alone, says Myra Gray, director of the...
Interview with Lisa SwanDeputy DirectorBiometrics Task Force, U.S. Army
American combat forces deployed in Afghanistan and Iraq employ biometrics to tell our friends from insurgents and terrorists. Back home, the Defense Department uses similar fingerprint, iris and facial recognition tools to manage access to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.