Is Russian Disinformation a Form of Hacking? November 20, 2019 Hugh Taylor Off Articles and Opinion, Featured, The first of a three-part series on Russian cyberattacks and disinformation campaigns against the United...
Guest Post: Don’t be the Phish: One Click Could Destroy Your Business November 19, 2019 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, Email is now the weapon of choice for cyber criminals--and we’re all prize targets. Let’s...
Content Disarm and Reconstruction (CDR) Technology November 19, 2019 Hugh Taylor Off Articles and Opinion, The need to spot unknown threats is one of the great challenges in cybersecurity. Traditional...
Guest Post: Learn Marriott’s Lesson: Before an M&A, Don’t Forget the “S” for Security November 18, 2019 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, The business case for data security due diligence during mergers and acquisitions By Brian Vecci,...
Solving the Message/Network Trust Problem November 12, 2019 Hugh Taylor Off Articles and Opinion, Featured, “This tape will self-destruct in 5 seconds…” As an anxious child with ADHD in the...
Minding the Machines: Security Challenges in CI/CD and Containerization November 6, 2019 Hugh Taylor Off Articles and Opinion, Featured, Innovations in computing tend to create new, bigger vulnerabilities. The excitement that greets the innovation...
The (Maybe Not Fast Enough) Evolution of Cybersecurity at the State Level November 3, 2019 Hugh Taylor Off Articles and Opinion, Featured, I spoke recently with Srini Subramanian, a principal in Deloitte & Touche LLP’s Cyber Risk Services practice....
Keeping Up with DDoS: Another Endless Front in the War October 31, 2019 Hugh Taylor Off Articles and Opinion, Featured, A few months ago, a friend suggested I donate money to Planned Parenthood in honor...
Guest Post: How hard is it to hack the US election? October 29, 2019 Hugh Taylor Off Articles and Opinion, Guest Posts, From NordVPN: Digital privacy expert discusses how easy it is to hack into voting machines...
Hardware-Based Security (HardSec): From Theory to Practice October 27, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, One of our key editorial principles at Journal of Cyber Policy is to nerd out...