Journal of Cyber Policy

Journal of Cyber Policy We present important topics related to cybersecurity policy in plain English. Our goal is to inform while stimulating productive dialogues about security.

Cyber Policy unifies the sub-fields of cyber defense, information security, hardware and software design, law enforcement and more to create a holistic, high-level approach to protecting society from cyberthreats.

Colonial Pipeline cyberattack shut off fuel supplies to US military.
05/10/2021

Colonial Pipeline cyberattack shut off fuel supplies to US military.

Colonial Pipeline Ransomware Colonial Pipeline Ransomware Attack

For all my Wall Street friends and investing mavens, I invite you to check out my new report, which looks at the relatio...
12/10/2020

For all my Wall Street friends and investing mavens, I invite you to check out my new report, which looks at the relationship between a company's cyber defenses and its stock performance. It is based on ratings from SecurityScorecard

analysis of cybersecurity and stock performance

Excited to announce that my new book is now live in Amazon!
06/18/2020

Excited to announce that my new book is now live in Amazon!

Digital Downfall: Technology, Cyberattacks and the End of the American Republic

Who's responsible for built-in cyber insecurities? Take a look in the mirror...  With expert insights from ,  Arm Insigh...
03/06/2020

Who's responsible for built-in cyber insecurities? Take a look in the mirror... With expert insights from , Arm Insight Inc, LastLine Web sentinel, Be-Strategic Solutions, , Trustwave

Home » Articles and Opinion » Featured » Seeking the Root Causes of Cyber Insecurity, Part III: People Seeking the Root Causes of Cyber Insecurity, Part III: People March 6, 2020 Hugh Taylor 0 Articles and Opinion, Featured, Third in a series of articles about the underlying factors that affect s...

How built-in security flaws make browsers and operating systems nearly impossible to defend.Menlo Security, Cybrary, For...
03/02/2020

How built-in security flaws make browsers and operating systems nearly impossible to defend.
Menlo Security, Cybrary, Fortanix, Hysolate

Home » Articles and Opinion » Featured » Seeking the Root Causes of Cyber Insecurity, Part II – Browsers and Operating Systems Seeking the Root Causes of Cyber Insecurity, Part II – Browsers and Operating Systems March 2, 2020 Hugh Taylor 0 Articles and Opinion, Featured, Second in a series o...

Understanding the challenges of scaling PKI for connected cars... Keyfactor
01/31/2020

Understanding the challenges of scaling PKI for connected cars... Keyfactor

Home » Articles and Opinion » Featured » Fill ‘Er Up and Check the PKI, Please Fill ‘Er Up and Check the PKI, Please January 31, 2020 Hugh Taylor 0 Articles and Opinion, Featured, Years ago, a cartoon in the New Yorker poked fun at auto mechanics who were now forced to fix newfangled devices ...

Address

Cleveland, OH
<<NOT

Alerts

Be the first to know and let us send you an email when Journal of Cyber Policy posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Journal of Cyber Policy:

Share