A Pathetic, Dangerous Resignation June 24, 2018 Hugh Taylor Off Articles and Opinion, Featured, I spoke recently at a regional cyber security conference on America’s need for a unified...
The Rise of Opaque Computing June 19, 2018 Hugh Taylor Off Articles and Opinion, Featured, From a security perspective, doing compute in the cloud is a bit like leaving teenaged...
AVAST Free Anti-Virus Logs “Incognito” Browsing History June 17, 2018 Hugh Taylor Off Articles and Opinion, Featured, If you use the free Avast Antivirus software, your web history is logged on your...
FTC-Recommended Best Practices for Cybersecurity from Inside and Outside Your Business June 12, 2018 Hugh Taylor Off Featured, Thought Leader, By Kimberly E. Diamond, Paul M. Gelb and Katherine E. Armstrong The Federal Trade Commission...
Balancing Security Policy with Business Objectives in Banking June 11, 2018 Hugh Taylor Off Featured, Thought Leader, Bankers face an exquisite dilemma over the balance between security and business strategy. On one...
Rising to the Challenge of Effective Control Implementation June 10, 2018 Hugh Taylor Off Featured, Thought Leader, Section A.10.10.1 of the ISO 27001 framework covers “Audit Logging Control.” It reads, “Audit logs...
IIOT Security Challenge: Building a Policy Enforcement Architecture June 8, 2018 Hugh Taylor Off Featured, Hardware Security, Business and government leaders are only now starting to come to grips with the cyber...
Luminate and SentinelOne Team Up to Deliver Zero Trust Corporate Architecture June 7, 2018 Hugh Taylor Off Featured, Industry News, Luminate Security and SentinelOne announced a partnership yesterday that offers a joint solution for Zero...
Website Security Policy for Smaller Organizations June 4, 2018 Hugh Taylor Off Articles and Opinion, Featured, I recently got an email from my CPA informing me that all of my tax...
Defining and Enforcing a USB Drive Security Policy June 3, 2018 Hugh Taylor Off Featured, Hardware Security, USB drives present one of the most well-known, but least mitigated security threats in every...