interviews

Recently you can’t pick up a trade magazine or get a cyber news email without hearing about machine learning and AI. Besides being the current buzz, there are many legitimate reasons to pay attention to this technology. I heard about Cylance, a leader in the application of machine learning to cyber issues, for the first […]

I am currently serving as the acting cybersecurity director and innovations officer for a large government contract. In these roles I have really come to appreciate the value of automation when properly applied and integrated well. At the same time, I really value the contributions that my senior technical folks make, but I constantly admonish […]

In my research on various security topics I kept running across the work of Professor Al-Shaer, whether I was investigating SDN and security, security automation and orchestration, network resiliency, IoT security, autonomous security, and much more. So I was delighted to meet him in person when we both attended the same conference this fall. His […]

Ron Gula has been at the forefront of the cybersecurity space for over 20 years, starting his career as a pentester for NSA and recently stepping down as the CEO and co-founder of Tenable Network Security. Now, Ron and his wife Cyndi are embarking on a new adventure, assisting other cybersecurity start-ups in terms of […]

The DHS Office of Cybersecurity and Communications is at the nexus of private-public information sharing as well as the executive agent for the national strategy for Critical Infrastructure Protection (CIP) and federal civilian agency strategy when it comes to the United States’ cybersecurity. So as the leader for this office, Ms. Jeanette Manfra has a […]

The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best practices and advice, information about threats, special memberships and more to help organizations get started securing their environment and to stay secure [SEE sidebar ad […]

The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and industry sectors. Standards and tools are emerging that will become the bulwark for active cyber defenses for the next generation. Learn from the Technical Leader […]

A Software-Defined Perimeter (SDP), as specified and endorsed by the Cloud Security Alliance (CSA), offers great potential in stopping or preventing many types of application attacks. Juanita Koilpillai, CEO of Waverley Labs, discusses how this technology works and how it may be applied to the cloud and IoT environments. Waverley Labs has developed and published […]

Mr. Steven Sprague, CEO of Rivetz Corp., discusses how the intersection of trusted computing and block chain provides a novel “proof of security” to protect high value transactions. Learn the background and details of how this proof of security works, and how a new cybersecurity marketplace based on a cybersecurity token can simplify the utilization […]