The key to data privacy: Giving consumers control January 27, 2023 Hugh Taylor 0 Articles and Opinion, Guest Posts, Here is how we can achieve a perfect day in data privacy. By Aubrey Turner,...
Trusting Employees to Make Good IT Decisions January 24, 2023 Hugh Taylor 0 Articles and Opinion, Featured, It may be time for a corporate updating of the wistful saying, misattributed to John...
Why Most IoT Cybersecurity Strategies Will Fail with Zero Trust: A Conversation with Denny LeCompte, CEO of Portnox January 11, 2023 Hugh Taylor Off Articles and Opinion, Featured, I spoke recently with Denny LeCompte, CEO of Portnox, maker of a cloud-native network access...
How Current Macroeconomic Challenges Will Impact Cybersecurity in 2023 January 11, 2023 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, Guest Post by By Leonid Belkind, CTO and Co-Founder of Torq As we’ve all seen,...
Cyber Venture Capital: A VC’s Perspective November 29, 2022 Hugh Taylor Off Articles and Opinion, Featured, Is the cybersecurity venture capital surge coming to an end? Overall, the VC world is...
IDC: Two Thirds of Organizations Lack Confidence in Vulnerability Identification November 20, 2022 Hugh Taylor Off Articles and Opinion, Featured, International Data Corporation (IDC), the market intelligence firm, just released a new InfoBrief that reveals...
Survey Reveals Problems for Cyber Insurance Carriers November 11, 2022 Hugh Taylor Off Articles and Opinion, Featured, Buying a cyber insurance policy is considered an effective way to manage residual cyber risk....
How Can CISOS Solve the Cybersecurity Talent Shortfall? September 22, 2022 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, By Shalom Bublil, Chief Product Officer at Kovrr As cybersecurity threats grow larger, organizations struggle...
Book Review: Russian Information Warfare: Assault on Democracies in the Cyber Wild West September 4, 2022 Hugh Taylor Off Articles and Opinion, Books and Reviews, Featured, Russian Information Warfare: Assault on Democracies in the Cyber Wild West, by Dr. Bilyana Lilly,...
The Role of the Fractional CISO August 12, 2022 Hugh Taylor Off Articles and Opinion, Featured, I recently sat down to speak with Christopher Prewitt, the CTO of Inversion6, a cybersecurity...