A Cyber Approach to Coronavirus Containment April 2, 2020 Hugh Taylor Off Articles and Opinion, Guest Posts, What lessons can be learned from reviewing how we manage cybersecurity and applying it to...
Guest Column: California’s Consumer Privacy Act (CCPA) to Change How Companies Store Data Nationwide March 9, 2020 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, By Richard Kanadjian, Encrypted USB Technology and Business Manager of Kingston Technology Privacy laws...
Most Spam Emails Originate in China, the US, and Germany February 21, 2020 Hugh Taylor Off Cyber Security Research, Guest Posts, NordVPN Provides 3 Things We All Should Be Alert of When Receiving an Email ...
Guest Post: Bringing DevSecOps into Play February 3, 2020 Hugh Taylor Off Articles and Opinion, Guest Posts, By Shauli Rozen, CEO of Cyber Armor Continuous integration (CI), continuous delivery (CD) and agile...
Guest Post: 2 Tips on How to Protect Kids from Cyberbullying February 3, 2020 Hugh Taylor Off Guest Posts, Infographics, Kids love surfing the internet during their free time. But, many don’t recognize the risks...
2020 predictions from Greg Wendt, Executive Director, Appsian January 7, 2020 Hugh Taylor Off Guest Posts, Greg Wendt, Executive Director, Appsian predicts: This year there will be a shift of CIO’s from...
From NordVPN: Make 2020 the most secure year ever: cybersecurity resolutions worth sticking to January 7, 2020 Hugh Taylor Off Guest Posts, NordVPN has issued the most important online security resolutions for the new year January...
From NordVPN: Governmental Institutions Around the World Fail to Protect Their Citizens’ Data December 5, 2019 Hugh Taylor Off Cyber Policy in the News, Guest Posts, Why Aren't Authorities Capable of Protecting Your Data? More and more governments around the world...
Is AI a Magic Wand for Security? December 4, 2019 Hugh Taylor Off Featured, Guest Posts, By Ofer Elzam Artificial intelligence (AI) has connotations that it’s poised to do many...
Guest Post: Don’t be the Phish: One Click Could Destroy Your Business November 19, 2019 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, Email is now the weapon of choice for cyber criminals--and we’re all prize targets. Let’s...