Artificial Intelligence vs. Threat Intelligence March 15, 2019 Hugh Taylor Off Articles and Opinion, Featured, I caught up with David Dufour, Vice President, Engineering at Webroot, at RSA 2019. We...
Mitigating GDPR Risks in Unstructured Data March 14, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you like action movies, you’ll be familiar with that moment when the star narrowly...
The Efficiency Partnership March 13, 2019 Hugh Taylor Off Articles and Opinion, Featured, When I cover RSA, I stay with my mother, who lives in San Francisco. I...
RSA 2019: Implementing EDR Across Multiple Device Types March 12, 2019 Hugh Taylor Off Articles and Opinion, Featured, RSA 2019 presented several notable themes. In almost every conversation, there was talk of making...
RSA 2019 Day 1: Going Beyond the Basics March 5, 2019 Hugh Taylor Off Articles and Opinion, Featured, A quick dispatch from the first full day of RSA 2019. Once in a while,...
The OT Challenge: Understanding Connectivity March 1, 2019 Hugh Taylor Off Articles and Opinion, Featured, Discussions about securing Operational Technology (OT), which includes systems for industrial operations and building management...
Apple, New York State and the Challenge of Vulnerability Disclosure January 31, 2019 Hugh Taylor Off Articles and Opinion, Featured, by Casey Ellis, CTO and founder of Bugcrowd On Wednesday, New York Governor Andrew Cuomo...
Fortanix Closes $23 Million Series B Round with Intel Capital January 30, 2019 Hugh Taylor Off Articles and Opinion, Featured, Fortanix, which offers a Runtime Encryption® platform, just announced that it has closed a $23...
Corralling Controls January 28, 2019 Hugh Taylor Off Articles and Opinion, Featured, Getting a large organization to change its approach to security controls brings to mind the...
Staying Ahead of Evolving Mobile Threats January 22, 2019 Hugh Taylor Off Articles and Opinion, Featured, Corporate computing is going mobile, with mobile corporate internet usage surpassing desktops in 2016. Now,...