Provider Profile: Keeper Security April 30, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Among the more shocking revelations in last year’s GAO audit of the Department of Defense’s...
Operationalizing Cyber Policy: An Occasional Series April 28, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, This is the first in what will hopefully be many articles on a topic of...
Ohio Cyber Reserve Bill Advances to House April 23, 2019 Hugh Taylor Off Articles and Opinion, Featured, Ohio Senate Bill 52, which creates the Ohio Cyber Reserve, a new division of the...
Mobile Security Policy Update April 17, 2019 Hugh Taylor Off Articles and Opinion, Featured, Mobile security in the enterprise, though not a new issue, is an increasingly serious subject...
Perspectives on Securing the IoT April 16, 2019 Hugh Taylor Off Articles and Opinion, Featured, The Internet of Things (IoT) continues to generate excitement in business and government. With its...
Preparing for Quantum Defense April 12, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you know your way around very old buildings in New York City, you will...
Avoiding the Coming Disaster in Satellite-Based Navigation April 10, 2019 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, Did you know that the US Naval Academy reinstated training in celestial navigation in 2015?...
The Pulse of Risk Detection and Response at RSA 2019 April 8, 2019 Hugh Taylor Off Articles and Opinion, Featured, The RSA Conference offers a great chance to catch up with vendors in the major...
CSA Summit at RSA 2019: Selected Takeaways April 1, 2019 Hugh Taylor Off Articles and Opinion, Featured, Perhaps, if you are like me, un homme d'un certain âge, you will recall ads...
RSA 2019 Public Sector Panel March 29, 2019 Hugh Taylor Off Articles and Opinion, Featured, Ellen Sundra, VP of Americas System Engineering at Forescout presided over a CIO and CISO...