RSA 2018 Profile: SecBI May 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, “All The President’s Men” is one of my all-time favorite movies. It’s got everything you...
RSA 2018 Profile: Upstream May 3, 2018 Hugh Taylor Off Articles and Opinion, Featured, RSA 2018 presented several moments of, “Oh no… I need to worry about THAT now?”...
Preserving Usability While Enforcing Access Compliance May 1, 2018 Hugh Taylor Off Articles and Opinion, Featured, By Scott Gordon We’re living in a complicated time right now in terms of enabling...
Opinion: What’s the rush on quantum-safe security? You already may be too late May 1, 2018 Hugh Taylor Off Articles and Opinion, Featured, By Scott Totzke, CEO & Co-Founder, ISARA Corporation The dawn of the quantum computing era...
RSA 2018 Wrap Up: Coffee is for Problem Solvers April 19, 2018 Hugh Taylor Off Articles and Opinion, Featured, Heading home from RSA 2018, my main reaction seems to be “wow!” What an incredible...
Are There Hardware Vulnerabilities in the Cyber Command? April 2, 2018 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, Are there hardware vulnerabilities in the electronics used by the U.S. Cyber Command? That is...
The Cyber Policy Sorta-Manifesto February 12, 2018 Hugh Taylor Off Articles and Opinion, Tech manifestos are often cringe-worthy acts of presumption, a harangue, a screech of superior attitude...
The Need for a Unifying Cyber Policy February 7, 2018 Hugh Taylor Off Articles and Opinion, Featured, Would You Buy a Car with No Brakes? Me, neither. Yet, if we take a...