The Power of Isolation June 3, 2019 Hugh Taylor Off Articles and Opinion, Featured, Greta Garbo (1905-1990) should be as much of an icon in cybersecurity as she is...
Getting Past Partial Attack Detection May 31, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, There’s an old joke that goes, “What’s worse than discovering a worm in your apple?...
Checking In On the GAO Report. Yeah, That One… May 30, 2019 Hugh Taylor Off Articles and Opinion, Featured, The news climate in the United States is such that important stories often receive less...
Kudos to Upstream for Publishing Research on Automotive Cyber Vulnerabilities May 23, 2019 Hugh Taylor Off Articles and Opinion, Cyber Security Research, Featured, I am a big admirer of thorough, thoughtful research into serious subjects that do not...
A Partnership for Maritime Cyber Security May 22, 2019 Hugh Taylor Off Articles and Opinion, Featured, Walter Winchell, the notorious radio commentator of the 1930s and 1940s, used to start his...
AI in Cybersecurity: Industry Perspectives May 21, 2019 Hugh Taylor Off Articles and Opinion, Featured, It is hard to miss the many references to the use of Artificial Intelligence (AI)...
Privacy Perspectives May 19, 2019 Hugh Taylor Off Articles and Opinion, Featured, When did privacy become such a big deal? Most people probably didn’t pay much attention...
Go Ahead, Get Paranoid: Rethinking Endpoint Security May 14, 2019 Hugh Taylor Off Articles and Opinion, Featured, In Dr. No, James Bond is about to leave his hotel room for some martinis...
Fighting Frictionless Fraud May 5, 2019 Hugh Taylor Off Articles and Opinion, Featured, Just about every breathless venture capital pitch for an online business includes the phrase, “It’s...
Provider Profiles: Network Visibility May 3, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Who’s on your network? What’s on your network? These questions never change, but the ways...