IT Security Policy for Multi-Cloud Environments April 5, 2018 Hugh Taylor Off Featured, Thought Leader, I spoke recently with Dr. Ratinder Paul Singh Ahuja, CEO of ShieldX, about the challenges...
Industrial Information Security Policy: Rethinking the “Air Gap” April 4, 2018 Hugh Taylor Off Featured, Secure Infrastructure, Thought Leader, Recent revelations of Russian hacking of US nuclear plants have brought the issue of industrial...
National Cyber Security Policy: An Industry Viewpoint March 13, 2018 Hugh Taylor Off Featured, Thought Leader, A few weeks ago, I spoke with Dave Venable of Masergy, a network company that...
Information Security Policy: The Benefit of Being Threat-Agnostic March 9, 2018 Hugh Taylor Off Featured, Thought Leader, I recently spoke with Rene Kolga of Nyotron about ways that organizations can improve their...
Understanding Multi-Layered Cyber Security Threats: A Conversation with Robert Huber March 6, 2018 Hugh Taylor Off Featured, Thought Leader, Establishing cyber policy requires understanding how cyberattacks can take shape in multiple layers of an...
Scanning Code for Malware: A Conversation with Robert Wood March 2, 2018 Hugh Taylor Off Featured, Thought Leader, Hugh Taylor: Tell us about yourself. Software is a big part of cyber policy. We really...
Using Machine Learning to Secure Networks: A Conversation with Kris Lovejoy February 21, 2018 Hugh Taylor Off Thought Leader, Hugh Taylor: Why don't you tell me a little about yourself, your background in security,...
Securing Critical Infrastructure: A Conversation with David Dingwall February 15, 2018 Hugh Taylor Off Thought Leader, Hugh Taylor: Tell us a little bit about yourself and your background and how you...
Securing Virtual Networks: A Conversation with Dwight Koop February 15, 2018 Hugh Taylor 1 Thought Leader, Hugh Taylor: Tell me a little bit about your background and the company you work...
Using Policy and Tools to Protect Email: A Conversation with AppRiver February 1, 2018 Hugh Taylor Off Thought Leader, We talked to Scottie Cole and Troy Gill of AppRiver about ways to protect networks...