Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
This month's most compelling news and views: top 10 government IT security stories of 2010, four components on the insider threat, pragmatic optimist Howard Schmidt and failure to enact major cybersecurity bill foreseen. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
Unfettered access to state data "is the kind of stuff that causes me to lose sleep at night," Delaware CSO Elayne Starkey says, in explaining new, stringent rules to let employees use their own smart phones to access state networks.
Matt Coose
Director, Federal Network Security
National Cybersecurity Division
Department of Homeland Security
As director of federal network security at the Department of Homeland Security's National Cybersecurity Division, Matt Coose is helping shepherd the Trusted Internet Connection initiative, which aims to...
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
The proliferation of smaller devices including advanced personal digital assistants, ultra-portable personal computers and high-speed cellular networks has made portable biometric systems a reality.
Georgia Tech professor sees computers with wireless connections as likely furnishing unprecedented opportunities for criminals, hackers, terrorists, spies and other unsavory actors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.