Ron Gula has been at the forefront of the cybersecurity space for over 20 years, starting his career as a pentester for NSA and recently stepping down as the CEO and co-founder of Tenable Network Security. Now, Ron and his wife Cyndi are embarking on a new adventure, assisting other cybersecurity start-ups in terms of […]
Step into the Forefront of Cybersecurity
Welcome to our Spotlight section. Here we showcase the most attention-worthy news and events, jaw-dropping products and top shelf services, rapidly rising players, and can’t-miss research and standards to keep you in the know when it comes to the cyber security industry, especially active cyber defense. We highlight how cutting edge active cyber defense strategies, products, and ideas apply to your field, whether you’re in computer security, cloud security, network security, IT security, adaptive security itself, or any other brand of cyber security. We’ve got you covered.
- Cyber Solutions Reviews – Discover new capabilities, functionality, tactics or strategies as we review and compare products and services offered by a diverse range of cybersecurity companies.
- Interviews – Learn from the experts and stand out individuals as we discuss their fresh perspectives on key concepts, debate hot topics, and reveal their success stories and tough lessons from their experience in the cyber security space.
- Cybersecurity News & Events – Get the inside scoop on the most interesting stuff happening right now in cybersecurity, or check out our calendar for a heads up so you don’t miss upcoming industry events.
- Research & Standards – Ensure that you’re up to date with the rules of the road, and gain insights from trending research, major reports, and more.
The DHS Office of Cybersecurity and Communications is at the nexus of private-public information sharing as well as the executive agent for the national strategy for Critical Infrastructure Protection (CIP) and federal civilian agency strategy when it comes to the United States’ cybersecurity. So as the leader for this office, Ms. Jeanette Manfra has a […]
The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best practices and advice, information about threats, special memberships and more to help organizations get started securing their environment and to stay secure [SEE sidebar ad […]
The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and industry sectors. Standards and tools are emerging that will become the bulwark for active cyber defenses for the next generation. Learn from the Technical Leader […]
A Software-Defined Perimeter (SDP), as specified and endorsed by the Cloud Security Alliance (CSA), offers great potential in stopping or preventing many types of application attacks. Juanita Koilpillai, CEO of Waverley Labs, discusses how this technology works and how it may be applied to the cloud and IoT environments. Waverley Labs has developed and published […]
Mr. Steven Sprague, CEO of Rivetz Corp., discusses how the intersection of trusted computing and block chain provides a novel “proof of security” to protect high value transactions. Learn the background and details of how this proof of security works, and how a new cybersecurity marketplace based on a cybersecurity token can simplify the utilization […]
Mr. Scott Musman discusses how game theory provides important contributions to cyber risk analysis modeling and to understanding mission impacts resulting from cyber attack. Learn the background and details of how the MITRE Cyber Security Game works in this interview with ActiveCyber. Recently I have been conducting some research into analytical approaches to risk assessment. […]
Professor Jintai Ding discusses his ground-breaking work in the complex world of post-quantum cryptography. Learn the background behind the development of his protocol for password authenticated key agreement (PAKE) that is based on a provably secure quantum-safe approach in this interview with ActiveCyber. Last fall I attended a conference in Toronto where I heard a […]
CEO Oliver Friedrichs discusses the evolution of Phantom – a security orchestration tool company that is riding high on technical innovation awards and respect from early adopters. Learn how you can accelerate your security operations and improve the return on your security tool investment though orchestrators like Phantom. Find out where this front-runner in the adaptive […]