Taking a Fresh Approach to Managing Third-Party Cyber Risk March 26, 2019 Hugh Taylor Off Articles and Opinion, Featured, The risk of cyberattack through third parties was a recurring theme at RSA 2019. The...
RSA 2019 Chat: Bandura Cyber March 24, 2019 Hugh Taylor Off Articles and Opinion, Featured, I spoke with Todd Weller, Chief Strategy Officer at Bandura Cyber at RSA 2019. Bandura...
Getting Serious about the Firmware Threat March 22, 2019 Hugh Taylor Off Articles and Opinion, Featured, Working in cyber security makes you paranoid. It’s an occupational hazard. Paranoia is also healthy,...
One Year Out from Cambridge Analytica, What Has Facebook Learned? March 20, 2019 Hugh Taylor Off Articles and Opinion, By Terry Ray One year after the Cambridge Analytica breach came to light, the world...
What It Takes to Manage Threat Intelligence Effectively March 20, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you’re a parent, you may use the phrase, “Play nicely together!” as a threat...
How the CISO Can Influence the Board and Senior Management March 19, 2019 Hugh Taylor Off Articles and Opinion, Featured, The penetration test at the power station was an eye-opener. Testers found administrative passwords printed...
Taking Action to Fill the Cybersecurity Staffing Void March 18, 2019 Hugh Taylor Off Articles and Opinion, Featured, One theme came up in virtually every conversation at RSA 2019: The serious shortage of...
RSA 2019 Catch Up: Lastline March 17, 2019 Hugh Taylor Off Articles and Opinion, Featured, I caught up with Lastline at RSA 2019, reconnecting with Co-Founder and CTO Giovanni Vigna,...
Artificial Intelligence vs. Threat Intelligence March 15, 2019 Hugh Taylor Off Articles and Opinion, Featured, I caught up with David Dufour, Vice President, Engineering at Webroot, at RSA 2019. We...
Mitigating GDPR Risks in Unstructured Data March 14, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you like action movies, you’ll be familiar with that moment when the star narrowly...