Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Senate Majority Leader Harry Reid, in a letter, informed Minority Leader Mitch McConnell of his decision to bring cybersecurity legislation to the floor during the first work period of 2012 legislative session.
When bankers contemplate risk, says Edward DeMarco Jr. of the Risk Management Association, what dominates headlines in the financial press should be of paramount concern.
NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.
U.S. and Estonian authorities have broken up one of the largest Internet crime schemes that allegedly netted $14 million in fraudulent advertising fees and infected 4 million computers in 100 countries.
The U.S. government is circulating a draft document of seven high-level categories detailing tasks, skills and job titles of IT security occupations that should help organizations to architect more effectively their staffs to safeguard data and systems.
Sen. Charles Schumer is asking the Federal Trade Commission to look into a new practice in which credit agencies keep estimates of individuals' personal information such as medication use and personal income from consumers.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
A new intelligence community report to Congress shows how the proliferation of new technologies, such as portable devices that connect to the Internet, will create new espionage opportunities for malicious actors.
The draft publication defines high-priority requirements for standards, official guidance and technology developments that need to be met in order for agencies to accelerate their migration of existing IT systems to the cloud computing model.
Researchers at security vendor Symantec say they've been in contact with a 20-something Chinese man who may be behind a series of attacks against U.S. businesses with the aim to steal intellectual property.
Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats.
Today ends National Cybersecurity Month, and one thing is clear: cybersecurity awareness does not equate secure cyber. "The market still doesn't appreciate how much good cybersecurity is worth," Rep. Jim Langevin says.
New research from Carnegie Mellon University's Software Engineering Institute provides further evidence why IT security isn't just the problem of an enterprise's security organization but of its top non-IT leadership as well.
CIOs and CISOs face the overwhelming mission of safeguarding systems and data while fiscal shortfalls force significant consolidation and reengineering of IT programs and services.
A hacker anywhere in the world could easily track the whereabouts and file-sharing habits of a Skype user and use the information for purposes of stalking, blackmail or fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.