A Partnership for Maritime Cyber Security May 22, 2019 Hugh Taylor Off Articles and Opinion, Featured, Walter Winchell, the notorious radio commentator of the 1930s and 1940s, used to start his...
AI in Cybersecurity: Industry Perspectives May 21, 2019 Hugh Taylor Off Articles and Opinion, Featured, It is hard to miss the many references to the use of Artificial Intelligence (AI)...
Privacy Perspectives May 19, 2019 Hugh Taylor Off Articles and Opinion, Featured, When did privacy become such a big deal? Most people probably didn’t pay much attention...
Go Ahead, Get Paranoid: Rethinking Endpoint Security May 14, 2019 Hugh Taylor Off Articles and Opinion, Featured, In Dr. No, James Bond is about to leave his hotel room for some martinis...
Fighting Frictionless Fraud May 5, 2019 Hugh Taylor Off Articles and Opinion, Featured, Just about every breathless venture capital pitch for an online business includes the phrase, “It’s...
Provider Profiles: Network Visibility May 3, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Who’s on your network? What’s on your network? These questions never change, but the ways...
Provider Profile: Keeper Security April 30, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, Among the more shocking revelations in last year’s GAO audit of the Department of Defense’s...
Operationalizing Cyber Policy: An Occasional Series April 28, 2019 Hugh Taylor Off Articles and Opinion, Featured, Uncategorized, This is the first in what will hopefully be many articles on a topic of...
Ohio Cyber Reserve Bill Advances to House April 23, 2019 Hugh Taylor Off Articles and Opinion, Featured, Ohio Senate Bill 52, which creates the Ohio Cyber Reserve, a new division of the...
Mobile Security Policy Update April 17, 2019 Hugh Taylor Off Articles and Opinion, Featured, Mobile security in the enterprise, though not a new issue, is an increasingly serious subject...