Adaptive Endpoint

Adaptively secure smartphones

My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts...

Security Process Automation

Getting Proactive About User & System Management

Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...

Voice Recognition Security ID

Voice Biometrics – Plugging the OPM Breach

Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors...

delay tactic - confusing crossroads

The Three Ds: Deception, Detection, Delay Part 3

Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and...

agile cloud security examples

Agile Cloud Security

Cloud Computing – A Potpourri of Adaptive Defenses Cloud adoption is gaining momentum by leaps and bounds. How can you argue with the ubiquity and elasticity that cloud computing offers?...

Cyber detection, deception and delay

The Three Ds: Deception, Detection, Delay

Active cyber defense offers deception, delay and persistent detection approaches to disrupt cyber attacks while also increasing the work factor for the attacker. By camouflaging defenses, deception can provide real-time...

adaptive cyber professional-f

Adaptive Endpoints

Living in a Hostile Cyber World “These are the times that try men’s souls…” – Thomas Paine You are the product manager for a new offering and you just clicked...

automated orchestration cybersecurity

Automated Orchestration

Ramping up Your Security Operations Center You just found out that your network is permeated with malware, and has been for months. What do you do now? You can’t just...

caught cyber criminal

The Three Ds: Deception, Detection, Delay Part 2

Choose Your Deception Active Cyber Defense can enable a large variety of specific deception tactics that can delay, confuse, scare away, or tie up an attacker depending on the circumstances...