Adaptive Endpoint

Bulb Security Lights the Way to Better Mobile Security

I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards...

Learn How D3 Security’s SOAR Platform Transforms SOC Operations In This Interview With ActiveCyber.net

I have been saying for a while that security automation, orchestration, and response (SOAR) tools are key enablers for tranforming SOC operations. And these tools have matured from glorified python...

AI and Mod-Sim Tools Create Insight for Better Cyber Investing

My recent SOC Service Manager experience got me to thinking about cyber tool sprawl and the return on investment that my customer was getting for their cyber investment. There is...

ActiveCyber Interviews Tony Sager – Chief Evangelist of the Center for Internet Security – on Emerging Technologies for Active Defenses

The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best...

Government-Industry Partnerships Enable Rapid Growth in Security Automation Advances and Adoption

The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and...

Security Orchestration: Looking Forward

Next Generation Concepts for Security Orchestration Workflow automation tools [aka orchestrators] are at the top of many CxOs’ buy and tech refresh lists as a way to drive down operational...

New Innovations Drive Active Cyber Defense

The operational tempo of the enterprise in cyberspace demands engagement of protections in cyber-relevant time. No longer can enterprises depend on human-driven processes to address the ever-increasing number of cyber...

Run-time Cyber Economics – Applying Risk-Adaptive Defenses

Well, it has been a long break since the last article of this series but I feel duty-bound to do this third article on cybersecurity investment since I find the...

The Rise of Quantum Computers – The Current State of Cryptographic Affairs

Quantum computing is highly desired by the supercomputing community for solving a wide range of problems that are extremely difficult (if not impossible) to solve today. One example of a...