Spotlight

Learn How High Yellowbrick Data Sets The Bar for High Performance Data Warehouse Solutions in This Interview with Active Cyber

Achieving and maintaining good security posture requires good situational awareness. Achieving “good” situational awareness requires capabilities that accurately reflect network status in real-time and are simple to use and access....

Learn How Code DX Simplifies Application Vulnerability Management, Security Testing, and Compliance In This Interview with Active Cyber

A couple of years ago I was investigating a security topic when I ran across some research by a company called Secure Decisions that I found quite interesting and relevant....

Save This Link – A Compendium of Active Cyber’s Articles and Interviews

Save This Link – A Compendium of Active Cyber’s Articles and Interviews

I thought for this tax day (April 15) I would take an accounting of the articles and interviews I have written or conducted since the inception of ActiveCyber.net. Since the...

DHS S&T Lays Out a Broad Yet Innovative Portfolio of Cybersecurity Research In This Year’s Showcase

I attended my first DHS S&T Showcase 3 years ago and since then I have looked forward eagerly each year to see what new cyber technologies are emerging from the...

Learn How D3 Security’s SOAR Platform Transforms SOC Operations In This Interview With ActiveCyber.net

I have been saying for a while that security automation, orchestration, and response (SOAR) tools are key enablers for tranforming SOC operations. And these tools have matured from glorified python...

Not Going to RSA? Check Out These Upcoming Cyber Conferences

Not going to the RSA 2019 Conference or MWC Barcelona? Maybe it’s sticker shock or the crowds or schedule or whatever. Late winter and spring are usually great times for...

Mr. Robert Rahmer, Program Manager of IARPA’s CAUSE Program, Discusses Progress in Cyber Event Forecasting Research

I have attended several conferences where researchers and practitioners describe some type of early warning system for cyber attacks. Some predictive systems involve the sharing of threat intelligence of attackers’...

Learn How Cybersecurity Dynamics Lays The Foundation For Advanced Cybersecurity Defenses In This Active Cyber Interview with Professor Shouhuai Xu of UTSA

When I first conceived the idea for this web site, I wanted to express a holistic, systematic and dynamic approach to designing and operating a secure environment. I had some...

Digital Forensics Pioneer Jim Christy Provides His Unique Insights In This Interview with Active Cyber™

From working on the Hanover hackers’ case with Dr. Cliff Stoll as described in The Cuckoo’s Egg to re-exploring a nearly 50 year old cold case of the infamous hijacker...