Active Cyber Defense

The Rise of Quantum Computers – The Current State of Cryptographic Affairs

Quantum computing is highly desired by the supercomputing community for solving a wide range of problems that are extremely difficult (if not impossible) to solve today. One example of a...

Who is Innovating in the IoT Security Space – and How?

The Internet of Things (IoT) is a hotbed of innovation but I have been wondering who is really innovating in the IoT Security space. It seems to me that IoT...

Continuing the Quest for How to Invest in Cybersecurity – Stops 2 and 3

ActiveCyber’s Quest for the Holy Grail of Cyber Investment: Part 2 ActiveCyber is on a journey this month to find the holy grail formula for cybersecurity investment. In this article...

ActiveCyber’s Quest for the Holy Grail of Cyber ROI

How Much Should I Invest in Cybersecurity? What Technology Should I Invest? Organizational risk managers and CISOs are faced with a seemingly bewildering set of investment choices and decision methods...

Cloud Access Security Brokerage

Cloud Access Security Brokers – The New Frontier of Active Cyber Defenses

One of the fastest technology growth areas for cloud security involves what is known as a Cloud Access Security Broker (CASB). At my last count there are over 20 vendors...

Adaptively secure smartphones

My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts...

Security Process Automation

Getting Proactive About User & System Management

Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...

Voice Recognition Security ID

Voice Biometrics – Plugging the OPM Breach

Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors...

delay tactic - confusing crossroads

The Three Ds: Deception, Detection, Delay Part 3

Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and...