Spotlight

Learn How Cybersecurity Dynamics Lays The Foundation For Advanced Cybersecurity Defenses In This Active Cyber Interview with Professor Shouhuai Xu of UTSA

When I first conceived the idea for this web site, I wanted to express a holistic, systematic and dynamic approach to designing and operating a secure environment. I had some...

Digital Forensics Pioneer Jim Christy Provides His Unique Insights In This Interview with Active Cyber™

From working on the Hanover hackers’ case with Dr. Cliff Stoll as described in The Cuckoo’s Egg to re-exploring a nearly 50 year old cold case of the infamous hijacker...

Cyber Risk Assessment Takes On An Actionable Approach In This Methodology by Dr. Charles Harry of UMD

Coming up with an assessment of cyber risk that is meaningful and actionable tends to be a task where practitioners consistently come up short. You are often stuck with two...

Learn How the Army Research Lab Is Paving the Way to a Virtual Reality-Based Security Operations Center In This Interview With ActiveCyber.net

I remember reading a novel several years ago by Tom Clancy that featured virtual reality (VR) as part of the plot’s security operations center capabilities. I remember thinking how this...

Learn How DARPA Is Leading Research In Developing Resilient and Cyber-Assured Embedded Systems In This Active Cyber Interview

Finding the right security solution is often a difficult task, with many complex trade-offs to consider. Building a secure system is even more challenging as history has shown. Designing and...

Dr. Ron Ross of NIST Discusses New Multi-dimensional Cyber Protection Strategy In This Interview with Active Cyber

One of the issues I have with standards is that they often take on a life of their own – different from what their authors intended – and, eventually become...

Active Cyber Interviews Maryam Rahmani of Global Cyber Alliance – Learn About Free DMARC and DNS Security Offerings to Fight Internet Threats

There are many “free” cybersecurity tools out there but it seems like there are just a handful that actually are having a positive effect on the global security issues of...

Cybrary’s Free and For Pay Training Offerings Helps to Turn Cyber Novices Into Professionals and Professionals Into Experts. Learn More In This Interview with Ralph Sita

As a former SOC Director, I was always looking for ways to increase the skill levels of my team or get them the education needed for certification while on a...

CyberFence from Ultra Electronics 3eTI Helps Secure ICS Enclaves – Learn How In This Interview with Ben Garber of 3eTI

ICS, SCADA, OT, PIT and even IoT are all acronyms that define a class of systems which manage the flows of data between sensors, actuators and control systems. Over the...