RSA 2018 Profile: Teramind April 29, 2018 Hugh Taylor Off Featured, Industry News, Teramind stood out at RSA 2018 as a company that offers a solution to a...
Cyber Risk Management and the Board of Directors April 27, 2018 Hugh Taylor Off Featured, Thought Leader, Security is a board-level issue. We have all repeated this mantra so many times that...
DHS: Moving Forward with Mobile Security April 27, 2018 Hugh Taylor Off Featured, Thought Leader, The Science and Technology Directorate (S&T) of the Department of Homeland Security (DHS) is responsible...
RSA 2018 Profile: XM Cyber April 26, 2018 Hugh Taylor Off Featured, Industry News, If Dr. Seuss had been a cybersecurity professional, he might have written a book called...
RSA 2018 Profile: Lastline April 26, 2018 Hugh Taylor Off Featured, Industry News, Dr. Giovanni Vigna, CTO of Lastline, offered the following useful insight into anomaly detection: “Not...
The Importance of Validating Controls: A Conversation with Trend Micro’s Ed Cabrera April 25, 2018 Hugh Taylor Off Featured, Thought Leader, Eduardo Cabrera, Chief Cybersecurity Officer at Trend Micro, is fond of quoting Winston Churchill, who...
Risk Assessment: Understanding the Financial Impact of Cyber Threats April 24, 2018 Hugh Taylor Off Featured, Thought Leader, Cyber risk assessment is a complicated matter for CISOs. While it’s hard enough to identify...
The Nuanced, Opaque World of Cyber Deterrence April 24, 2018 Hugh Taylor Off Cyberwar, Featured, “Does she, or doesn’t she?” Dye her hair… of course. This sales hook from Clairol...
RSA 2018 Profile: Votiro Secured April 22, 2018 Hugh Taylor Off Featured, Industry News, Would you like a slice of cake, hold the calories? That’s the basic idea behind...
The Appeal of Managed Security Services for InfoSec Policy Implementation April 22, 2018 Hugh Taylor Off Featured, Thought Leader, Should you engage with a Managed Security Services (MSS) provider? This was a question I...