How to counter cybersecurity threats from risky but non-malicious apps May 29, 2018 Hugh Taylor Off Featured, Thought Leader, By David Richardson Military leaders got an unpleasant surprise in January 2018 when maps of...
Treating the Whole Email Patient May 29, 2018 Hugh Taylor Off Articles and Opinion, Featured, Cybersecurity and medicine have a lot in common. It’s not accident we refer to certain...
Trapping a True Cyborg May 28, 2018 Hugh Taylor Off Articles and Opinion, Featured, As a culture, we have read and watched so many stories about cyborgs that we...
EY’s Sydow Shares Cyber Insights with Senate Committee on Banking, Housing and Urban Affairs May 27, 2018 Hugh Taylor Off Featured, Industry News, The US Senate’s Committee on Banking, Housing and Urban Affairs met on May 24 in...
Building Security into Enterprise Information Management May 24, 2018 Hugh Taylor Off Articles and Opinion, Featured, Today’s PDF is tomorrow’s point of vulnerability. Personal data and intellectual rests in your data,...
Enfuse 2018: James Comey on Navigating a Tough Few Years for Policy May 23, 2018 Hugh Taylor Off Articles and Opinion, Featured, Before former FBI Director James Comey took the stage to deliver the keynote on day...
Protecting Machine Identity May 15, 2018 Hugh Taylor Off Articles and Opinion, Featured, “Digital Transformation” is an appealing, if slightly overhyped buzzword in IT circles. Broadly, the term...
RSA 2018 Conversation: Citrix’s Mike Orosz May 10, 2018 Hugh Taylor Off Articles and Opinion, Featured, Watch how he spends money. That’s popular advice on dating sites for finding “Mr. Right.”...
RSA 2018 Profile: Forcepoint May 10, 2018 Hugh Taylor Off Featured, Thought Leader, A man sits uncomfortably in a dentist’s chair. So what? A lot of people feel...
RSA 2018 Conversation: Unisys’ Jonathan Goldberger May 8, 2018 Hugh Taylor Off Featured, Thought Leader, RSA 2018 presented a stunning but at times bewildering array of security technologies. From proven...