Security Engineering Principles for Mobile Apps November 26, 2018 Hugh Taylor Off Articles and Opinion, Featured, When we look back on this era, we might observe that the road to security...
Securing Collaboration November 22, 2018 Hugh Taylor Off Articles and Opinion, Featured, The Talmud, the 2 million word-long book of Jewish law, contains a number of discussions...
Cyber Geopolitics: The Paris Call for Trust and Security in Cyberspace November 16, 2018 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, This is the first in what I hope will be an ongoing series about the...
Moving Beyond Passwords (Finally? Really?) November 6, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Will we ever be free of passwords? I once worked at a global tech company...
Securing Unstructured Data to Comply with Privacy Laws November 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, I don’t know about you, but I cannot stand the expression, “Not to mention.” It...
Secure Mobility November 2, 2018 Hugh Taylor Off Articles and Opinion, Featured, A few years ago, when I had a regular job, my employer gave me a...
Refining the MSSP Model October 30, 2018 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, The traditional Managed Security Services Provider (MSSP) business model is being challenged by circumstances and...
The Other Problem with the 2020 Census October 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, The 2020 Census approaches, fraught and politicized. The most visible issue seems to be the...
Securing the DevOps Process October 26, 2018 Hugh Taylor Off Articles and Opinion, Featured, How do you ensure security and compliance in the fast-moving DevOps process? Security has always...
Building Collaboration and Trust in SecOps October 25, 2018 Hugh Taylor Off Articles and Opinion, Featured, I spoke recently with John Cassidy, Co-Founder and CEO of King & Union, about the...