Partner With Us for Security & Success

Interested in how you can advance your cybersecurity career, promote thought leadership, or boost your brand? Opportunities abound for growing together. Let's talk. Partner With Us »

Shed Light on the Shadows in Spotlight

In the dark when it comes to today's super hackers and cyber attacks? Build your arsenal and knowledge base with the latest products, trends, and leading innovators. Discover Spotlight »

Downloads – Grow Your Cyber Guru

Learn how to become a knight of the new order of predictive and proactive cyber protection in our free new ebook, Protecting the Future Enterprise: Active Cyber Defense. Download Now »

Seize Today, Train for Tomorrow

Solving problems is good; preventing them is better. Upgrade your cyber skills with helpful webinars, tutorials, case studies, links, product guides, and more. Explore Training & Resources »

Get Free Brain Food & Cyber Brawn

With APTs and the IoT, determining the right CoA for your SIRT is tough. Smarter cybersecurity comes from not only knowing the language, but deciphering the benefits. How? EZ, Read Articles »

Clever Insights

Cyber intelligence, meet cyber savvy. Drawing from our deep experience and diverse network, we're here to make you think with our quality information, actionable applications, and illuminating ideas.

Customized Instruction

Rise to the challenge, and the top of the class. Use our online training tools covering both beginner and advanced cyber defense strategies and tactics as we guide you to become the next ACD acolyte.

Convenient Information

Want to dive deep into specifics, or float across a wide sea of topics? It's easy in our immersive 360° Spotlight section that brings together products, gurus, events, and innovators all under one roof.

Community Interaction

Active Cyber Defense is a giant leap for cybersecurity. Getting involved is the first step. Join the conversation here, follow us, and watch the future unfold. Contact or Partner with Us today.

Smarter Cybersecurity Starts with Active Cyber Defense

Discover how active cyber defense strategies are advancing the front lines of the cyber security industry at lightning speeds, and how you could benefit, too.

The Latest in Active Cyber Defense & Cybersecurity:

ActiveCyber Interviews Ron Gula – Former Tenable CEO Embarks on New Venture in Cybersecurity Start-up Investing

Ron Gula has been at the forefront of the cybersecurity space for over 20 years, starting his career as a pentester for NSA and recently stepping down as the CEO...

ActiveCyber Interviews Jeanette Manfra – Assistant Secretary for the Office of Cybersecurity and Communications at DHS on Cybersecurity Strategies and Plans

The DHS Office of Cybersecurity and Communications is at the nexus of private-public information sharing as well as the executive agent for the national strategy for Critical Infrastructure Protection (CIP)...

ActiveCyber Interviews Tony Sager – Chief Evangelist of the Center for Internet Security – on Emerging Technologies for Active Defenses

The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best...

Government-Industry Partnerships Enable Rapid Growth in Security Automation Advances and Adoption

The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and...

Security Orchestration: Looking Forward

Next Generation Concepts for Security Orchestration Workflow automation tools [aka orchestrators] are at the top of many CxOs’ buy and tech refresh lists as a way to drive down operational...

Waverley Labs Pioneers Open Source Version of CSA’s Software-Defined Perimeter Specification

A Software-Defined Perimeter (SDP), as specified and endorsed by the Cloud Security Alliance (CSA), offers great potential in stopping or preventing many types of application attacks. Juanita Koilpillai, CEO of...

Start-up Rivetz Wants to Secure Internet Transactions Using Crypto Tokens that Provide Proof of Security

Mr. Steven Sprague, CEO of Rivetz Corp., discusses how the intersection of trusted computing and block chain provides a novel “proof of security” to protect high value transactions. Learn the...

ActiveCyber Interviews Scott Musman, MITRE, About Applying Gaming Techniques to Cyber Risk Estimation

Mr. Scott Musman discusses how game theory provides important contributions to cyber risk analysis modeling and to understanding mission impacts resulting from cyber attack. Learn the background and details of...

ActiveCyber Interviews Professor Jintai Ding – Author of Post-Quantum Safe Crypto Algorithm and PAKE Protocol

Professor Jintai Ding discusses his ground-breaking work in the complex world of post-quantum cryptography. Learn the background behind the development of his protocol for password authenticated key agreement (PAKE) that...