Securing Devices that May be “Smart” but Insecure October 11, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you listen carefully to most discussions of cybersecurity, you can hear an assumption—often hidden—that...
Operationalizing Security Policy: The Value of Proactivity October 4, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Walking the corridors of a show like RSA or BlackHat, you can see a lot...
Cowbell Cyber Launches Industry’s First Continuous Cyber Insurance Underwriting Platform September 24, 2019 Hugh Taylor Off Articles and Opinion, Featured, Industry News, And now, some serious metaphor mixing… If you’ve been following the evolution of #cyber insurance...
Making the Case for Continuous, Automated Security Testing September 24, 2019 Hugh Taylor Off Articles and Opinion, Featured, Phil Quade’s new book, The Digital Big Bang, which characterizes cyber security as a scientific...
Making Sense of the Senate’s “America’s Data at Risk” Report September 17, 2019 Hugh Taylor Off Articles and Opinion, Featured, In June of this year, the Senate Permanent Subcommittee on Investigations published a 99-page report...
An Advance in Cryptographic Key Management September 4, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Unbound Tech’s motto is “Math over Matter.” This concept is on display as the company...
Why AI Is The New Frontier In Cybersecurity August 29, 2019 Hugh Taylor Off Articles and Opinion, by J. Eduardo Campos With breach attempts and cyberattacks increasing, many companies say artificial intelligence...
NeuShield: Anti-Ransomware Innovation August 26, 2019 Hugh Taylor Off Articles and Opinion, Featured, The ransomware news continues to get worse with every passing month. Right now, Texas is...
New Approaches to IAM August 23, 2019 Hugh Taylor Off Articles and Opinion, Featured, Much of cybersecurity rests on the answers to few simple questions: Who is trying to...
Fighting the New Phone Phreaks August 6, 2019 Hugh Taylor Off Articles and Opinion, Featured, Some of the earliest hackers started out as phone phreaks. They tried to break into...