Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.
Extensive news coverage about the attacks against RSA and others have made customers jittery. "The publicity resulted in many customers' risk tolerance going down whilst their level of awareness and concern went up," says RSA CFO David Goulden.
"The lack of individual accountability over user accounts provides ample opportunities to conceal malicious activity such as theft or misuse of veteran data," VA Assistant Inspector General Belinda Finn says.
The General Services Administration expects the cloud-based system will reduce e-mail operation costs by 50 percent and save more than $15.2 million over the next five years.
You don't need to agree with assailants' motivation, most of us don't. But you must understand what's behind their action to help defend against their intrusions.
"Consumer notification is often hampered by the fact that companies must first determine their obligations under 47 different state regimes," says Rep. Mary Bono Mack, R-Calif., the subcommittee's chair and bill's sponsor.
If enacted,the bill that's heading to the House floor would require increased coordination and prioritization of federal cybersecurity R&D activities and the development of cybersecurity technical standards. It also would strengthen cybersecurity education and talent development and promote industry partnership...
Disciplining IT and IT security managers following a breach of their systems rarely happens, and perhaps there's a good reason they shouldn't be punished.
As a report of one of the worst digital assaults against the Pentagon surfaces, Deputy Secretary William Lynn III unveils a new Defense Department cyberspace strategy in which the Pentagon will more actively defend military and defense industry systems and networks.
Eddie Schwartz didn't shy away from the offer to become RSA's first chief security officer after the security firm experienced a sophisticated advanced-persistent-threat breach. Instead, Schwartz embraced the hack as the reason to take the job. (See RSA to Get Its First Chief Security Officer.)
RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.
Eddie Schwartz, the new - and first - chief security officer of RSA, says the IT security provider hit by a sophisticated advanced-persistent-threat attack in March is focusing internal security on efforts to reduce the time an intruder can go undetected.
The release of the list coincides with the issuance of the Common Weakness Scoring System that allows software makers to identify vulnerabilities in their programs and buyers to determine software they acquire is secure.
SafeNet CEO Chris Fedde says top executives, not chief information or chief information security officers, should have final say on what data to encrypt.
Not all shootings, fires and accidents are of equal import, regardless of the dramatic visuals they may produce. The same can be said about information security breaches.
"Overall, this draft is not balanced," Rep. Henry Waxman, D-Calif., said at a hearing on the measure "It gives businesses too many protections and consumers not enough. It preempts strong state laws and replaces them with a weak federal one."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.