Spotlight

Learn About Emerging Research in Autonomous Vehicle Safety and Security in This Active Cyber Interview With NIST’s Dr. Ed Griffor

Autonomous vehicles (AVs) have been given considerable attention lately, and for good reason, as large tech giants such as Google, Apple, Amazon and of course Tesla have invested hundreds of...

Bulb Security Lights the Way to Better Mobile Security

I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards...

DHS S&T Lays Out a Broad Yet Innovative Portfolio of Cybersecurity Research In This Year’s Showcase

I attended my first DHS S&T Showcase 3 years ago and since then I have looked forward eagerly each year to see what new cyber technologies are emerging from the...

Mr. Robert Rahmer, Program Manager of IARPA’s CAUSE Program, Discusses Progress in Cyber Event Forecasting Research

I have attended several conferences where researchers and practitioners describe some type of early warning system for cyber attacks. Some predictive systems involve the sharing of threat intelligence of attackers’...

University of Maryland 15th Annual Forum Highlights Research At Intersection of Cyber, Business, and Public Policy

I recently attended the Fifteenth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective at the University of Maryland. The forum was hosted by Professors Lawrence A....

ActiveCyber Interviews Professor Ehab Al-Shaer on Advanced Research in Autonomous Cyber Defenses

In my research on various security topics I kept running across the work of Professor Al-Shaer, whether I was investigating SDN and security, security automation and orchestration, network resiliency, IoT...

ActiveCyber Interview With Dr. Doug Maughan – DHS HSARPA Cyber Director

Learn about the expansive portfolio of cyber security research going on at DHS HSARPA as Dr. Doug Maughan lays out the many cyber research programs planned and underway to tackle...

Are We There Yet? A Walk Through Quantum Capabilities Today

Are We There Yet? A Walk Through Quantum Capabilities Today

I remember reading not long ago a news snippet about NSA deprecating some aspects of Elliptic Curve Cryptography due to quantum computing. Quantum computing has been futuristic for quite some...

JHU APL Community Day Lays Out Research Roadmap for Active Cyber Defense

Johns Hopkins University Applied Physics Lab (JHU APL) hosted a “Community Day” October 5th to highlight some of the research conducted on behalf of the Department of Homeland Security (DHS...