New Approaches to IAM August 23, 2019 Hugh Taylor Off Articles and Opinion, Featured, Much of cybersecurity rests on the answers to few simple questions: Who is trying to...
Fighting the New Phone Phreaks August 6, 2019 Hugh Taylor Off Articles and Opinion, Featured, Some of the earliest hackers started out as phone phreaks. They tried to break into...
The Role of Cybersecurity in M&A July 29, 2019 Hugh Taylor Off Articles and Opinion, Featured, The due diligence process for mergers and acquisitions (M&A) has long included a review of...
Book Review: The Cult of the Dead Cow July 28, 2019 Hugh Taylor Off Articles and Opinion, Books and Reviews, Featured, Reading The Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save...
From NordVPN: Younger Children Are Using Digital Devices More Than Ever Before July 17, 2019 Hugh Taylor Off Articles and Opinion, Featured, Submitted by NordVPN A Study Reveals Most Common Children’s Online Activities and Occurring Threats A...
Advances in the Quantification and Management of Risk July 14, 2019 Hugh Taylor Off Articles and Opinion, Featured, There’s a certain type of scoffer who mocks people who are concerned with risk by...
Application Security in 2019 July 3, 2019 Hugh Taylor Off Articles and Opinion, Featured, When you browse a web page or start up a mobile app, do you really...
Testing the Cyber Incident Response Plan June 28, 2019 Hugh Taylor Off Articles and Opinion, Featured, As cybersecurity becomes a more urgent concern in the corporate world, the field is attracting...
Innovations in Data Security June 26, 2019 Hugh Taylor Off Articles and Opinion, Featured, The torrent of data breaches is overwhelming people. It’s now a common assumption that data...
Growth, Money and Confusion in the Security Operations Category June 18, 2019 Hugh Taylor Off Articles and Opinion, Featured, How would you categorize a solution that helps you respond to security threats? The cybersecurity...