Spotlight

Learn How Advances in Cybersecurity Metrics Research Moves Holistic Approach for Cyber Defenses Forward in This Active Cyber™ Interview

Learn How Advances in Cybersecurity Metrics Research Moves Holistic Approach for Cyber Defenses Forward in This Active Cyber™ Interview

For several years I have been honored to be a guest at the annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective organized at the University of...

Active Cyber™ Interviews Djenana Campara – CEO of KDM Analytics – On How Integrated Software Assurance Can Reduce Cyber Risk

Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks – but ones...

Active Cyber Interviews NIST Scientists on the Next Generation Access Control Standard

Many years ago I was hosting a series of workshops on a variety of security topics. One of those topics dealt with role-based, attribute-based, and policy-based access control approaches and...

JHUAPL Brings SOAR Technology to Universities As Part of Educational Outreach and Adoption Strategy

Adopting a new technology can be fun but also challenging, especially if the technology is new to the market and there isn’t a lot of veteran users around who can...

Acquired Data Solutions Offers Help to Businesses to Meet New Federal and DoD Cyber Compliance Standards

Securing operational technology and IoT has just received a new compliance push as the DoD is targeting small businesses in its mandate for Cybersecurity Maturity Model Certification. Katie Arrington, special...

Krystal Covey of DCISE Discusses the DoD-DIB Threat Information Sharing Program with Active Cyber

Tools that provide threat information sharing have been a hot technology over the last couple of years. However the tools are only as good as the information that is provided....

Learn About Emerging Research in Autonomous Vehicle Safety and Security in This Active Cyber Interview With NIST’s Dr. Ed Griffor

Autonomous vehicles (AVs) have been given considerable attention lately, and for good reason, as large tech giants such as Google, Apple, Amazon and of course Tesla have invested hundreds of...

Diverse Set of Security Innovators Converge at Black Hat 2019

Diverse Set of Security Innovators Converge at Black Hat 2019

Black Hat 2019 has come and gone and I am still recovering from the sensory overload caused by the 19K+ attendees of this big conference amidst the backdrop of Las...

Bulb Security Lights the Way to Better Mobile Security

I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards...