Security Engineering Principles for Mobile Apps November 26, 2018 Hugh Taylor Off Articles and Opinion, Featured, When we look back on this era, we might observe that the road to security...
Securing Collaboration November 22, 2018 Hugh Taylor Off Articles and Opinion, Featured, The Talmud, the 2 million word-long book of Jewish law, contains a number of discussions...
Cyber Geopolitics: The Paris Call for Trust and Security in Cyberspace November 16, 2018 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, This is the first in what I hope will be an ongoing series about the...
Secure Mobility November 2, 2018 Hugh Taylor Off Articles and Opinion, Featured, A few years ago, when I had a regular job, my employer gave me a...
The Other Problem with the 2020 Census October 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, The 2020 Census approaches, fraught and politicized. The most visible issue seems to be the...
Securing the DevOps Process October 26, 2018 Hugh Taylor Off Articles and Opinion, Featured, How do you ensure security and compliance in the fast-moving DevOps process? Security has always...
Building Collaboration and Trust in SecOps October 25, 2018 Hugh Taylor Off Articles and Opinion, Featured, I spoke recently with John Cassidy, Co-Founder and CEO of King & Union, about the...
Arctic Wolf: SOC-as-a-Service October 23, 2018 Hugh Taylor Off Articles and Opinion, Featured, Sam McLane is concerned about mental health. In particular, McLane, who serves as Chief Technology...
Thinking Beyond the Basic MSSP October 15, 2018 Hugh Taylor Off Articles and Opinion, Featured, Managed Security Services Providers (MSSPs) are great. They help SecOps teams focus on important security...
The Firmware Risk October 12, 2018 Hugh Taylor Off Articles and Opinion, Featured, Thought Leader, The recent flap over whether Chinese intelligence agencies placed spy chips on motherboards built by...