Leadership Roles of Women in Cybersecurity March 3, 2020 Hugh Taylor Off Cyber Security Research, Leadership Roles of Women in Cybersecurity Leadership Roles of Women in CybersecurityPR NewswireBETHESDA, Md., March...
Book Review – Coding Democracy: How Hackers are Disrupting Power, Surveillance and Authoritarianism March 2, 2020 Hugh Taylor Off Books and Reviews, Featured, Coding Democracy: How Hackers are Disrupting Power, Surveillance and Authoritarianism By Maureen Webb Coding...
Seeking the Root Causes of Cyber Insecurity, Part II – Browsers and Operating Systems March 2, 2020 Hugh Taylor Off Articles and Opinion, Featured, Second in a series of articles about the underlying factors that affect security posture We...
Government Employees Unprepared for Ransomware Attacks: IBM Survey March 1, 2020 Hugh Taylor Off Cyber Security Research, Government Employees Unprepared for Ransomware Attacks: IBM Survey A recent survey from IBM Security revealed...
20 Ransomware Statistics You’re Powerless to Resist Reading – Security Boulevard March 1, 2020 Hugh Taylor Off Cyber Security Research, 20 Ransomware Statistics Youâre Powerless to Resist Reading - Security Boulevard #Ransomware attacks are on...
California’s new cybersecurity law sidesteps most medical devices, lawyers say March 1, 2020 Hugh Taylor Off Cyber Security Research, California's new cybersecurity law sidesteps most medical devices, lawyers say How the state enforces its...
Report: Hackers target logistics – DC Velocity March 1, 2020 Hugh Taylor Off Cyber Security Research, Report: Hackers target logistics – DC Velocity Attacks on smart supply chains and ocean transport...