Spotlight

Krystal Covey of DCISE Discusses the DoD-DIB Threat Information Sharing Program with Active Cyber

Tools that provide threat information sharing have been a hot technology over the last couple of years. However the tools are only as good as the information that is provided....

Learn About Emerging Research in Autonomous Vehicle Safety and Security in This Active Cyber Interview With NIST’s Dr. Ed Griffor

Autonomous vehicles (AVs) have been given considerable attention lately, and for good reason, as large tech giants such as Google, Apple, Amazon and of course Tesla have invested hundreds of...

Diverse Set of Security Innovators Converge at Black Hat 2019

Diverse Set of Security Innovators Converge at Black Hat 2019

Black Hat 2019 has come and gone and I am still recovering from the sensory overload caused by the 19K+ attendees of this big conference amidst the backdrop of Las...

Bulb Security Lights the Way to Better Mobile Security

I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards...

Verodin Sets the Pace in the Emerging Security Instrumentation Market

I am always on the lookout for new, innovative tools especially ones that break new ground in the cybersecurity fight. At a recent conference I ran across a tool that...

Learn How High Yellowbrick Data Sets The Bar for High Performance Data Warehouse Solutions in This Interview with Active Cyber

Achieving and maintaining good security posture requires good situational awareness. Achieving “good” situational awareness requires capabilities that accurately reflect network status in real-time and are simple to use and access....

Learn How Code DX Simplifies Application Vulnerability Management, Security Testing, and Compliance In This Interview with Active Cyber

A couple of years ago I was investigating a security topic when I ran across some research by a company called Secure Decisions that I found quite interesting and relevant....

DHS S&T Lays Out a Broad Yet Innovative Portfolio of Cybersecurity Research In This Year’s Showcase

I attended my first DHS S&T Showcase 3 years ago and since then I have looked forward eagerly each year to see what new cyber technologies are emerging from the...

Learn How D3 Security’s SOAR Platform Transforms SOC Operations In This Interview With ActiveCyber.net

I have been saying for a while that security automation, orchestration, and response (SOAR) tools are key enablers for tranforming SOC operations. And these tools have matured from glorified python...