Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
The Washington think tank Center for Strategic and International Studies released in December a report from the Commission on Cybersecurity for the 44th Presidency, a bipartisan comprehensive study initiated in 2007 of the cybersecurity challenges the next president would face. Among the commission's recommendation...
As Russian forces invaded the former Soviet bloc ally Georgia last summer, hackers in seemingly coordinated effort with their government assaulted Georgian Internet sites and services. The virtual warfare demonstrated that attacking another country's Internet sites could have devastating military and economic...
The most overused phrase uttered by Government Accountability Office auditors when assessing compliance or the lack thereof by federal agencies is: "progress has been made, but...." The "but" shows how little progress really has been achieved.
Government Accountability Office auditors will have a busy spring, examining a number of federal government programs aimed at securing government information systems and data.
In an interview with GovInfoSecurity.com, Gregory Wilshusen discusses how the GAO is looking at how private industry and two dozen federal...
As Congress tackles reforming the Federal Information Security and Management Act, known as FISMA, provisions in the new legislation likely will more precisely define responsibility for departmental and agency information security.
In this exclusive interview, cybersecurity expert Paul Kurtz, chief information...
Reform legislation is expected to be introduced this spring to update the Federal Information Security and Management Act, known as FISMA. A major complaint about FISMA is that complying with its rules does not necessarily guarantee departmental and agency information systems are secure.
In this exclusive...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.