Author: Hugh Taylor
Take Our Firmware Security Survey
We would like to hear what you think about firmware-borne threats. Please take two minutes...
Using Policy and Tools to Protect Email: A Conversation with AppRiver
We talked to Scottie Cole and Troy Gill of AppRiver about ways to protect networks...
Cyber Defense: A Conversation with Jason McNew
Jason McNew Founder and CEO of Stronghold Cyber Security, has over 20 years of experience...
Building Trust Into Hardware: A Conversation with Steve Sprague
Hugh Taylor: Tell us about yourself. Steven Sprague: I've been at the forefront at the...
Cyberwar is Not Hypothetical. The US is Under Attack Today.
While it’s impossible to state with certainty that all electronics built in China or other...
Understanding the Firmware Threat
Every electronic device contains software code that resides on its circuitry. The device will not...
Taking a Closer Look at Chinese Electronics
AT&T has cancelled its deal with Huawei over US government concerns that the Chinese company’s...
Notice: Trying to access array offset on value of type bool in /home/hqsgonlgctf9/public_html/journalofcyberpolicy.com/wp-content/themes/first-mag-pro/content.php on line 6
Notice: Trying to access array offset on value of type bool in /home/hqsgonlgctf9/public_html/journalofcyberpolicy.com/wp-content/themes/first-mag-pro/content.php on line 7
Notice: Trying to access array offset on value of type bool in /home/hqsgonlgctf9/public_html/journalofcyberpolicy.com/wp-content/themes/first-mag-pro/content.php on line 8
The Media Trust introduces Adx.txt Manager, an easy-to-use tool to consume and manage every digital publisher’s ads.txt file data
By continuously capturing ads.txt file data, this new, real-time service drives transparency into the programmatic...
