Want to Control Your Data? The @ Company Is Here to Help November 19, 2020 Hugh Taylor Off Articles and Opinion, Featured, If you’ve ever gotten one of those letters from your bank or insurance company that...
How to Spot Retail Scams | Black Friday Scams (2020) | Tessian November 16, 2020 Hugh Taylor Off Cyber Security Research, Featured, How to Spot Retail Scams | Black Friday Scams (2020) | Tessian Hackers take advantage...
If You Give the CFO a Dollar… October 30, 2020 Hugh Taylor Off Articles and Opinion, Featured, Everyone envies the Chief Financial Officer (CFO), even if they don’t say it out loud....
The Reasonable Robot: Artificial Intelligence and the Law October 15, 2020 Hugh Taylor Off Books and Reviews, Featured, The Reasonable Robot: Artificial Intelligence and the Law, a new book by Ryan Abbott, MD,...
Making Co-Managed Security Work October 14, 2020 Hugh Taylor Off Articles and Opinion, Featured, Should you outsource IT? According to industry research, about three quarters of small-to-midsized businesses (SMBs)...
33 Types of DDoS Attacks Dissected October 2, 2020 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, By David Balaban Every electronic system has a finite data processing capacity. This threshold is...
Remote Work Insecurity: Research Reveals Half of Organizations Experienced Security Incidents While Working Remotely September 30, 2020 Hugh Taylor Off Cyber Security Research, Featured, A new report from Tessian, the email security company, reveals that 75% of IT decision...
85% of CISOs Admit they Sacrificed Cybersecurity to Quickly Enable Employees to Work Remotely September 22, 2020 Hugh Taylor Off Articles and Opinion, Cyber Security Research, Featured, New research from Netwrix, the data security vendor, reveals that 85% of CISOs said that...
News Insights: U.S. charges 5 Chinese hackers, 2 accomplices with broad campaign of cyberattacks September 16, 2020 Hugh Taylor Off Cyber Policy in the News, Featured, U.S. charges 5 Chinese hackers, 2 accomplices with broad campaign of cyberattacks A senior law...
Proposed Digital Identity Law seeks to Modernize USA’s Lagging Digital Identity Infrastructure September 14, 2020 Hugh Taylor Off Articles and Opinion, Featured, On September 11, Representatives Bill Foster (D-IL), John Katko (R-NY), Jim Langevin (D-RI), and Barry...