Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.
The NSA looks to expand its cybersecurity, science and engineering workforce. "Our need for these skills is enormous; therefore, we need to be using cool high tech tools," says Kathy Hutson, agency associated director for human resources.
"Until the missing elements are addressed," the GAO audit said, "there is an increased risk that smart grid implementations will not be secure as otherwise possible."
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
This week's top news and views: Conscripting cybersecurity experts to protect IT, State battles data leakage and President Obama signs bill to reorganize the National Institute of Standards and Technology.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Ground was broken on the Utah Data Center, a $1.2 billion, 1 million-square-foot cybersecurity center being built for the National Security Agency at Camp Williams near Salt Lake City.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.
Federal agencies have until Jan. 28 to complete an assessment on how they handle confidential information, a process prompted by the WikiLeaks episode that exposed 250,000-plus diplomatic cables in November, says OMB Director Jacob Lew.
The new law also directs NIST to collaborate with industry to develop cloud computing standards, formalizing NIST's cloud computing activities begun in the past two years.
Imagine drafting the top IT security minds into a defense force to protect the nation's critical IT infrastructure. Defense Minister Jaak Aaviksoo and other Estonian leaders mull the possibility of instituting such a draft.
Federal employees practice good IT security hygiene, especially when they're in the office; less so when they work remotely, possibly because IT security measure are seen hindering productivity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.