RSA 2018 Conversation: Unisys’ Jonathan Goldberger May 8, 2018 Hugh Taylor Off Featured, Thought Leader, RSA 2018 presented a stunning but at times bewildering array of security technologies. From proven...
RSA Quick Take: How Do You Inspect What You Can’t See? May 2, 2018 Hugh Taylor Off Featured, Thought Leader, Chester Wisniewski, Principal Research Scientist at Sophos, posed a question that I couldn’t answer. (And...
Cyber Risk Management and the Board of Directors April 27, 2018 Hugh Taylor Off Featured, Thought Leader, Security is a board-level issue. We have all repeated this mantra so many times that...
DHS: Moving Forward with Mobile Security April 27, 2018 Hugh Taylor Off Featured, Thought Leader, The Science and Technology Directorate (S&T) of the Department of Homeland Security (DHS) is responsible...
The Importance of Validating Controls: A Conversation with Trend Micro’s Ed Cabrera April 25, 2018 Hugh Taylor Off Featured, Thought Leader, Eduardo Cabrera, Chief Cybersecurity Officer at Trend Micro, is fond of quoting Winston Churchill, who...
Risk Assessment: Understanding the Financial Impact of Cyber Threats April 24, 2018 Hugh Taylor Off Featured, Thought Leader, Cyber risk assessment is a complicated matter for CISOs. While it’s hard enough to identify...
The Appeal of Managed Security Services for InfoSec Policy Implementation April 22, 2018 Hugh Taylor Off Featured, Thought Leader, Should you engage with a Managed Security Services (MSS) provider? This was a question I...
Cyber Security Policy Vs. Reality: The Xage Point of View on NERC CIP April 13, 2018 Hugh Taylor Off Featured, Thought Leader, Amidst all the talk of systemic vulnerability in America’s electrical grid, it’s not fair to...
Healthcare Information Security Policy: Mitigating Medical Device Risks April 9, 2018 Hugh Taylor Off Featured, Thought Leader, There’s a great Monty Python sketch where John Cleese plays a pompous surgeon who berates...
IT Security Compliance: Balancing Productivity with Security April 8, 2018 Hugh Taylor Off Featured, Hardware Security, Thought Leader, Endpoint security is the perpetual bête noire of IT security compliance. Ask anyone tasked...