Presenting OT Security Risk to the Board January 14, 2019 Hugh Taylor Off Articles and Opinion, Featured, By Phil Neray, VP of Industrial Cybersecurity at CyberX Operational Technology (OT) networks were traditionally...
Signs of the Paradigm Shift in Identity and Access Management December 27, 2018 Hugh Taylor Off Articles and Opinion, Featured, As we come to the end of 2018, it’s difficult to see what meaningful progress...
Security Engineering Principles for Mobile Apps November 26, 2018 Hugh Taylor Off Articles and Opinion, Featured, When we look back on this era, we might observe that the road to security...
Securing Collaboration November 22, 2018 Hugh Taylor Off Articles and Opinion, Featured, The Talmud, the 2 million word-long book of Jewish law, contains a number of discussions...
Cyber Geopolitics: The Paris Call for Trust and Security in Cyberspace November 16, 2018 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, This is the first in what I hope will be an ongoing series about the...
Moving Beyond Passwords (Finally? Really?) November 6, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Will we ever be free of passwords? I once worked at a global tech company...
Securing Unstructured Data to Comply with Privacy Laws November 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, I don’t know about you, but I cannot stand the expression, “Not to mention.” It...
Secure Mobility November 2, 2018 Hugh Taylor Off Articles and Opinion, Featured, A few years ago, when I had a regular job, my employer gave me a...
Refining the MSSP Model October 30, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, The traditional Managed Security Services Provider (MSSP) business model is being challenged by circumstances and...
The Other Problem with the 2020 Census October 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, The 2020 Census approaches, fraught and politicized. The most visible issue seems to be the...