Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Tom Stanton, a fellow at the Center for the Study of American Government at Johns Hopkins University, knows cybersecurity and government, having authored last year's study, Defending Cyberspace: Protecting Individuals, Government Agencies and Private Companies Against Persistent and Evolving Threats.
In an...
Cyberspace command to provide combat-ready forces trained and equipped to conduct sustained cyber operations to be fully integrated with the Air Force's air and space operations.
There's been much talk in recent months about employing red teams - those groups of friendly hackers - and automated controls to test for security vulnerabilities on government IT systems.
The government is set to ramp up the use of red-team assaults to test vulnerabilities of civilian agencies' IT systems, something Defense and intelligence agencies have done for years. Here's the transcript of our chat with Tony Sager, who heads a National Security Agency group that conducts red-team assaults.
Retired Air Force CIO John Gilligan explains why federal agencies need to adopt the Consensus Audit Guidelines as well as employ red teams to attack their systems to identify vulnerabilities.
The push is on to use red teams to assault civilian agencies' IT systems to test for vulnerabilities. But experts question if enough of these qualified hackers exist to meet the anticipated need.
Charlotte, N.C., Chief Information Security Office Randy Moulton, unlike his counterparts in the federal government, is responsible for writing the regulations that guides the city government secure its IT security.
As Moulton explains in this interview with Information Security Media Group's Eric Chabrow, ...
The law rarely keeps pace with advancements in information technology, and the 35-year-old federal Privacy Act has failed to provide the proper framework needed to protect the privacy of citizens.
Dan Chenok chaired the federal Information Security and Privacy Advisory Board that issued a report entitled Toward a...
Obama administration officials say the document contained no classified material about nuclear weapons and contends the locales, other details were already publicly available.
A few prominent names have been mentioned as the potential cybersecurity czar. But I'd be surprised if any of them would be offered the job, and if they were, I'd doubt they'd accept it.
For the first time, NIST has included security controls in its catalog for national security and non-national security systems in its latest revision, No. 3, of Special Publication 800-53.
Rep. James Langevin, D.-R.I., holds out hope that the new White House cybersecurity coordinator will have more influence with the president than Obama suggested in his speech last week outlining the administration's approach to information security.
As co-chair of the House Cybersecurity Caucus and the influential...
Though often referred to as a "czar," President Obama's new IT security adviser will be exactly what the commander in chief described in his White House address on Friday: a cybersecurity coordinator.
Maine's two senators stood together as the only current Republicans to back President Obama's stimulus package, but have diverged on whether a senior White House official should coordinate government cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.