Businesses at Risk Due to Unidentified Network Traffic, According to Sophos Global Survey April 19, 2018 Hugh Taylor Off Featured, Network Security, Sophos (LSE: SOPH), the network and endpoint security company, just published the results of a new survey,The...
RSA 2018 Wrap Up: Coffee is for Problem Solvers April 19, 2018 Hugh Taylor Off Articles and Opinion, Featured, Heading home from RSA 2018, my main reaction seems to be “wow!” What an incredible...
A10 Networks Introduces One-DDoS Protection to Expand Defenses against Denial of Service Attacks April 17, 2018 Hugh Taylor Off Featured, Industry News, A10 Networks (NYSE: ATEN), a provider of intelligent and automated cybersecurity solutions, today announced A10...
Tripwire Expands Cloud Security Capabilities with Cloud Management Assessor April 17, 2018 Hugh Taylor Off Featured, Industry News, Tripwire, the provider of security and compliance solutions for enterprises and industrial organizations, announced that...
Cyber Security Policy Vs. Reality: The Xage Point of View on NERC CIP April 13, 2018 Hugh Taylor Off Featured, Thought Leader, Amidst all the talk of systemic vulnerability in America’s electrical grid, it’s not fair to...
Healthcare Information Security Policy: Mitigating Medical Device Risks April 9, 2018 Hugh Taylor Off Featured, Thought Leader, There’s a great Monty Python sketch where John Cleese plays a pompous surgeon who berates...
IT Security Compliance: Balancing Productivity with Security April 8, 2018 Hugh Taylor Off Featured, Hardware Security, Thought Leader, Endpoint security is the perpetual bête noire of IT security compliance. Ask anyone tasked...
IT Security Policy for Multi-Cloud Environments April 5, 2018 Hugh Taylor Off Featured, Thought Leader, I spoke recently with Dr. Ratinder Paul Singh Ahuja, CEO of ShieldX, about the challenges...
Industrial Information Security Policy: Rethinking the “Air Gap” April 4, 2018 Hugh Taylor Off Featured, Secure Infrastructure, Thought Leader, Recent revelations of Russian hacking of US nuclear plants have brought the issue of industrial...
Are There Hardware Vulnerabilities in the Cyber Command? April 2, 2018 Hugh Taylor Off Articles and Opinion, Cyberwar, Featured, Are there hardware vulnerabilities in the electronics used by the U.S. Cyber Command? That is...