Spotlight

Learn About SBOMs In This Active Cyber™ Interview with Dr. Jean Camp of Indiana University

April 2, 2024 Software Bill of Materials (SBOMs) have been a hot ticket even before they were listed as a key initiative for secure software development practices in the National...

Learn About the Evolution of Issues Involving Bug Bounty Programs in This Active Cyber™ Interview with Dr. Rahul Telang

February 29, 2024 One cybersecurity area that I tend to spotlight involves vulnerability management programs.  From vulnerability discovery, disclosure, sharing, prioritization, and remediation, there are many different types of tools,...

Learn How Nucleus Security Takes Vulnerability Management To Next Level In This Interview With Active Cyber™

Active Cyber™ Interviews Dr. Ben Harvey of AI Squared About Their Low Code/ No Code AI/ML Integration Platform

Artificial Intelligence / Machine Learning (AI/ML) are hot topics these days when it comes to politics, technology, and personal living. There is much discussion around the ethics, the threats, and...

Active Cyber™ Interviews Kelly Schulz – CEO of Maryland Tech Council – on Cyber Advocacy and Innovation in Maryland

I was delighted to see the recent appointment of Kelly Schulz as CEO for the Maryland Tech Council. Ms. Schulz has played a prominent role in Maryland politics for many...

Learn How Advances in Cybersecurity Metrics Research Moves Holistic Approach for Cyber Defenses Forward in This Active Cyber™ Interview

For several years I have been honored to be a guest at the annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective organized at the University of...

Active Cyber™ Interviews Djenana Campara – CEO of KDM Analytics – On How Integrated Software Assurance Can Reduce Cyber Risk

Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks – but ones...

Active Cyber Interviews NIST Scientists on the Next Generation Access Control Standard

Many years ago I was hosting a series of workshops on a variety of security topics. One of those topics dealt with role-based, attribute-based, and policy-based access control approaches and...

JHUAPL Brings SOAR Technology to Universities As Part of Educational Outreach and Adoption Strategy

Adopting a new technology can be fun but also challenging, especially if the technology is new to the market and there isn’t a lot of veteran users around who can...