Agile Cloud

agile cloud security examples

Agile Cloud Security

Cloud Computing – A Potpourri of Adaptive Defenses Cloud adoption is gaining momentum by leaps and bounds. How can you argue with the ubiquity and elasticity that cloud computing offers?...

Cyber detection, deception and delay

The Three Ds: Deception, Detection, Delay

Active cyber defense offers deception, delay and persistent detection approaches to disrupt cyber attacks while also increasing the work factor for the attacker. By camouflaging defenses, deception can provide real-time...

adaptive cyber professional-f

Adaptive Endpoints

Living in a Hostile Cyber World “These are the times that try men’s souls…” – Thomas Paine You are the product manager for a new offering and you just clicked...

automated orchestration cybersecurity

Automated Orchestration

Ramping up Your Security Operations Center You just found out that your network is permeated with malware, and has been for months. What do you do now? You can’t just...

caught cyber criminal

The Three Ds: Deception, Detection, Delay Part 2

Choose Your Deception Active Cyber Defense can enable a large variety of specific deception tactics that can delay, confuse, scare away, or tie up an attacker depending on the circumstances...

ACD Capabilities - What's Your Cyber Health?

Active Cyber Defense Capability Areas

Being Active For Your Cyber Health We all know that having an active lifestyle can promote good health in our physical world. The same is true for the cyber defense...

Active Cyber Defense emerges amidst the cloud

What is Active Cyber Defense?

Feeling Some Vertigo in The Cloud? Time for a Barrel Roll. Things are a bit different up in the cloud. Uncertainty can set in. Storms can hit without warning causing...

cyber intelligence based defenses

Intel-based Defenses

Intel-Based Defenses and Cyber Intelligence In my last post I talked about the six capability areas that comprise active cyber defense.  In this post, I will begin to break down...

cyber security pros investigating

Intel-Based Defenses Part 2

Sharing Cyber Intelligence Is No Longer An Option The rate of major data breaches across all industry verticals has reached alarming levels. The pace of these attacks is fueled by sophisticated...