Perspectives on Securing the IoT April 16, 2019 Hugh Taylor Off Articles and Opinion, Featured, The Internet of Things (IoT) continues to generate excitement in business and government. With its...
Preparing for Quantum Defense April 12, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you know your way around very old buildings in New York City, you will...
Avoiding the Coming Disaster in Satellite-Based Navigation April 10, 2019 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, Did you know that the US Naval Academy reinstated training in celestial navigation in 2015?...
The Pulse of Risk Detection and Response at RSA 2019 April 8, 2019 Hugh Taylor Off Articles and Opinion, Featured, The RSA Conference offers a great chance to catch up with vendors in the major...
CSA Summit at RSA 2019: Selected Takeaways April 1, 2019 Hugh Taylor Off Articles and Opinion, Featured, Perhaps, if you are like me, un homme d'un certain âge, you will recall ads...
RSA 2019 Public Sector Panel March 29, 2019 Hugh Taylor Off Articles and Opinion, Featured, Ellen Sundra, VP of Americas System Engineering at Forescout presided over a CIO and CISO...
Taking a Fresh Approach to Managing Third-Party Cyber Risk March 26, 2019 Hugh Taylor Off Articles and Opinion, Featured, The risk of cyberattack through third parties was a recurring theme at RSA 2019. The...
RSA 2019 Chat: Bandura Cyber March 24, 2019 Hugh Taylor Off Articles and Opinion, Featured, I spoke with Todd Weller, Chief Strategy Officer at Bandura Cyber at RSA 2019. Bandura...
Getting Serious about the Firmware Threat March 22, 2019 Hugh Taylor Off Articles and Opinion, Featured, Working in cyber security makes you paranoid. It’s an occupational hazard. Paranoia is also healthy,...
What It Takes to Manage Threat Intelligence Effectively March 20, 2019 Hugh Taylor Off Articles and Opinion, Featured, If you’re a parent, you may use the phrase, “Play nicely together!” as a threat...