The Polar Fitness Tracker Episode and the Frustrating Pace of Military Cyber Policy Change July 11, 2018 Hugh Taylor Off Articles and Opinion, Featured, The US Navy fought and won the battle of Midway in June, 1942, just six...
Defending Against GPS Spoofing July 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, It used to be so easy. In the days before smartphones and PCs, if you...
Privacy by Design July 3, 2018 Hugh Taylor Off Articles and Opinion, Featured, If you heard a collective groan emanating from the American west last week, it wasn’t...
Expert Roundup: The California Consumer Privacy Act of 2018 June 29, 2018 Hugh Taylor Off Articles and Opinion, Featured, The State of California has enacted a new law, the California Consumer Privacy Act of...
Understanding the Implications of the Fastbooking.com Breach June 27, 2018 Hugh Taylor Off Articles and Opinion, Featured, SC Media reported yesterday that hundreds of hotels suffered data breaches after hackers exploited a...
A Pathetic, Dangerous Resignation June 24, 2018 Hugh Taylor Off Articles and Opinion, Featured, I spoke recently at a regional cyber security conference on America’s need for a unified...
The Rise of Opaque Computing June 19, 2018 Hugh Taylor Off Articles and Opinion, Featured, From a security perspective, doing compute in the cloud is a bit like leaving teenaged...
AVAST Free Anti-Virus Logs “Incognito” Browsing History June 17, 2018 Hugh Taylor Off Articles and Opinion, Featured, If you use the free Avast Antivirus software, your web history is logged on your...
Website Security Policy for Smaller Organizations June 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, I recently got an email from my CPA informing me that all of my tax...
Using Blockchain to Reimagine Identity Management June 1, 2018 Hugh Taylor Off Articles and Opinion, Featured, Identity and access management (IAM) offers a good example of how security policy decisions trigger...