Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
What's the rush?
Legislation to create the post of White House cybersecurity advisor who would report directly to the president, introduced earlier this week by Sens. Jay Rockefeller, D.-W.Va., and Olympia Snowe, R.-Maine, may prove to be a great idea. Yet, was the legislation introduced too soon?
Is the price to safeguard America's information systems and networks on a collision course with efforts to rescue the economy? One would hope not, but the $789 billion stimulus package signed earlier this month by President Obama that contains nearly $10 billions for IT-related projects offered very little for...
With the launch of GovInfoSecurity.com comes the launch of my blog, The Public Eye.
First, a brief biography. I've been a journalist for too long. In my first job I used a manual typewriter and had a pair of sharp scissors and a paste pot on my desk.
Federal agencies want to employ cloud computing technology, but are hesitant because of information security concerns and existing government compliance regulations.
"Cloud computing is of great interest to the U.S. government, and it's seen as a great opportunity to promote efficiencies, but there is not...
As federal agencies ponder whether to use cloud computing--the ability to access applications and data on servers over the Internet--the big security challenge isn't necessarily technical, employing the right technologies to assure the protection of data. What could prove to be an obstacle is certifying host IT...
Legislation to create a national cybersecurity advisor who would report directly to the President was introduced in the Senate Wednesday.
The legislation would establish the Office of the National Cybersecurity Advisor within the Executive Office of the President.
Managers mitigate risk by understanding their agencies' missions, smartly employing configuration and identity management and using common sense, the longtime federal government IT leader says in her GovInfoSecurity.com blog.
The Department of Homeland Security is on the defense against the Conficker computer worm, releasing a tool it says can detect the malware on computer networks.
A sense permeates across the capital that major changes will soon occur on how the federal government secures its information systems.
As Congress revs up to reform information security processes for the first time in seven years, and the Obama administration is weeks into a 60-day review of cybersecurity policy,...
The director of National Intelligence sees the United States as relatively safe from damaging virtual attacks from foreign nations on our critical IT infrastructure, such as what happened last summer when Russia invaded neighboring Georgia, but the U.S. must be vigilant to keep its critical IT systems safe.
Future federal cybersecurity policy will originate in the White House, but the Obama administration has yet to decide whether the so-called cybersecurity czar will report directly to the President or to his national security advisor, according to two lawmakers briefed Thursday by Melissa Hathaway, the top...
Responding, in part, to federal IT security requirements, the National Association of State CIOs on Thursday issued a brief entitled Desperately Seeking Security Frameworks A Roadmap for State CIOs .
China's growing military muscle includes inroads into cyber warfare, says a Pentagon report issued Wednesday.
"China's ability to sustain military power at a distance remains limited, but its armed forces continue to develop and field disruptive military technologies, including those for anti-access/area-denial, as...
The time is ripe to create a fourth branch of the military a cyber-warfare branch.
So conclude two Army officers. The existing cultures of the Army, Navy and Air Force are fundamentally incompatible to adequately defend against cyber attacks, argue Lt. Col. Gregory Conti and Col. John "Buck" Surdu, in an article...
National Institute of Standards and Technology special publications can be huge, and their hefty size can deter agencies from following the institute's guidance to safeguard IT systems and data. Toss a 200-plus page 800-series special publication on the desk of a CIO, a not-too-uncommon refrain goes, and he'll push it...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.