Spotlight

Learn How Nucleus Security Takes Vulnerability Management To Next Level In This Interview With Active Cyber™

Active Cyber™ Interviews Dr. Ben Harvey of AI Squared About Their Low Code/ No Code AI/ML Integration Platform

Artificial Intelligence / Machine Learning (AI/ML) are hot topics these days when it comes to politics, technology, and personal living. There is much discussion around the ethics, the threats, and...

Active Cyber™ Interviews Kelly Schulz – CEO of Maryland Tech Council – on Cyber Advocacy and Innovation in Maryland

I was delighted to see the recent appointment of Kelly Schulz as CEO for the Maryland Tech Council. Ms. Schulz has played a prominent role in Maryland politics for many...

Learn How Advances in Cybersecurity Metrics Research Moves Holistic Approach for Cyber Defenses Forward in This Active Cyber™ Interview

For several years I have been honored to be a guest at the annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective organized at the University of...

Active Cyber™ Interviews Djenana Campara – CEO of KDM Analytics – On How Integrated Software Assurance Can Reduce Cyber Risk

Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks – but ones...

KDM Analytics’ Blade Risk Analysis Solution Powers A Secure Software Development Life Cycle and Supply Chain

Agile risk assessment at industrial scale Operational technology (OT) systems now connect operations and maintenance equipment to information technology (IT) infrastructures. Doing so enables increased automation and real-time, data-driven decision...

Active Cyber Crosswalks EO 14028

In my last article on the EO 14028 I mentioned that I thought there were several parallels between what the EO was calling out and some of the concepts and...

Active Cyber Reviews Executive Order 14028 – Improving the Nation’s Cybersecurity

Early this past summer 2021 a friend of mine was asking me about Executive Order 14028 on Improving the Nation’s Cybersecurity and I had to admit that I had largely ignored it....

What Roles Do Provenance and Reputation Play in “Authentic-By-Design” Approaches to Digital Content?

People make decisions every day that involve risk and uncertainty. Generally, we reconcile a variety of decision models using risk criteria often provided by organizational policies and/or guided by a...