Treating the Whole Email Patient May 29, 2018 Hugh Taylor Off Articles and Opinion, Featured, Cybersecurity and medicine have a lot in common. It’s not accident we refer to certain...
Trapping a True Cyborg May 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, As a culture, we have read and watched so many stories about cyborgs that we...
The Risk of Mandating Backdoors May 27, 2018 Hugh Taylor Off Articles and Opinion, Last week, at his keynote at the Enfuse 2018 conference, former FBI Director James Comey...
Building Security into Enterprise Information Management May 24, 2018 Hugh Taylor Off Articles and Opinion, Featured, Today’s PDF is tomorrow’s point of vulnerability. Personal data and intellectual rests in your data,...
Enfuse 2018: James Comey on Navigating a Tough Few Years for Policy May 23, 2018 Hugh Taylor Off Articles and Opinion, Featured, Before former FBI Director James Comey took the stage to deliver the keynote on day...
Protecting Machine Identity May 15, 2018 Hugh Taylor Off Articles and Opinion, Featured, “Digital Transformation” is an appealing, if slightly overhyped buzzword in IT circles. Broadly, the term...
RSA 2018 Conversation: Citrix’s Mike Orosz May 10, 2018 Hugh Taylor Off Articles and Opinion, Featured, Watch how he spends money. That’s popular advice on dating sites for finding “Mr. Right.”...
RSA 2018 Profile: SecBI May 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, “All The President’s Men” is one of my all-time favorite movies. It’s got everything you...
RSA 2018 Profile: Upstream May 3, 2018 Hugh Taylor Off Articles and Opinion, Featured, RSA 2018 presented several moments of, “Oh no… I need to worry about THAT now?”...
Preserving Usability While Enforcing Access Compliance May 1, 2018 Hugh Taylor Off Articles and Opinion, Featured, By Scott Gordon We’re living in a complicated time right now in terms of enabling...