Spotlight

Learn How Ransomware Affects Government Agencies In This Active Cyber™ Interview with Jason Baker of GRIT

July 10, 2024 I like returning each year to the AFCEA Technet Cyber Conference as it always has a lively exhibit hall and interesting panels and discussions. It is also...

Learn How KDM Analytics Provides Automated and Continuous Risk Assessment For Complex Systems In This Active Cyber™ Interview

Learn How KDM Analytics Provides Automated and Continuous Risk Assessment For Complex Systems In This Active Cyber™ Interview

July 8, 2024 I remember making the case for automated and continuous risk assessment many years ago when the NIST Risk Management Framework (RMF) was first being drafted and put...

IARPA Issues Award for ReSCIND Program to SRI For Novel Network Defense Technology

Press Release – March 7, 2024 SRI chosen to deliver cyber-psychology-informed network defense technology for IARPA  The innovative program will be centered around the psychology of cyber attackers.   [March 7,...

Cyber Security Ai Stock photos by Vecteezy

Active Cyber™ Explores the Future Landscape of Cyber and AI – Part 1

April 18, 2024 It is evident over the last few years that central national governments are applying tighter controls on the security of software and hardware products – from labels for...

Active Cyber™ Explores the Future Landscape of Cyber and AI – Part 2

April 18, 2024 This is the second part of a two part series. You can find the first part of this feature at this link. It is evident over the...

Learn About SBOMs In This Active Cyber™ Interview with Dr. Jean Camp of Indiana University

April 2, 2024 Software Bill of Materials (SBOMs) have been a hot ticket even before they were listed as a key initiative for secure software development practices in the National...

Learn About the Evolution of Issues Involving Bug Bounty Programs in This Active Cyber™ Interview with Dr. Rahul Telang

February 29, 2024 One cybersecurity area that I tend to spotlight involves vulnerability management programs.  From vulnerability discovery, disclosure, sharing, prioritization, and remediation, there are many different types of tools,...

Learn How Nucleus Security Takes Vulnerability Management To Next Level In This Interview With Active Cyber™

Active Cyber™ Interviews Dr. Ben Harvey of AI Squared About Their Low Code/ No Code AI/ML Integration Platform

Artificial Intelligence / Machine Learning (AI/ML) are hot topics these days when it comes to politics, technology, and personal living. There is much discussion around the ethics, the threats, and...