Articles

Active Cyber™ Picks Top 3 Cybersecurity Challenges for 2023

As 2022 ended and we rolled into another year, I began to see the yearly editions of the top data breaches, top threats, and top privacy fines from different cyber...

The Authenticity of Cyber Attribution – Who Do You Believe?

I have been thinking a lot lately about the accuracy of cyber attack attribution. Most cyber forensic analysts and threat intelligence specialists will tell you that cyber attack attribution done...

What Roles Do Provenance and Reputation Play in “Authentic-By-Design” Approaches to Digital Content?

People make decisions every day that involve risk and uncertainty. Generally, we reconcile a variety of decision models using risk criteria often provided by organizational policies and/or guided by a...

Enabling Authenticity and Trust in the IoT Age Using Decentralized Systems

It has been over 30 years since the the web was introduced, and most of us are facing critical problems involving the security and privacy of our digital identity, our...

Authenticity-by-Design: Ensuring the Authenticity of Content and Identity

Current Security Trends Reveal Difficulties in Assuring Authenticity Recently I was thinking about some of the major security challenges and problems of 2020 and going forward into 2021 like the...