Partner With Us for Security & Success

Interested in how you can advance your cybersecurity career, promote thought leadership, or boost your brand? Opportunities abound for growing together. Let's talk. Partner With Us »

Shed Light on the Shadows in Spotlight

In the dark when it comes to today's super hackers and cyber attacks? Build your arsenal and knowledge base with the latest products, trends, and leading innovators. Discover Spotlight »

Downloads – Grow Your Cyber Guru

Learn how to become a knight of the new order of predictive and proactive cyber protection in our free new ebook, Protecting the Future Enterprise: Active Cyber Defense. Download Now »

Seize Today, Train for Tomorrow

Solving problems is good; preventing them is better. Upgrade your cyber skills with helpful webinars, tutorials, case studies, links, product guides, and more. Explore Training & Resources »

Get Free Brain Food & Cyber Brawn

With APTs and the IoT, determining the right CoA for your SIRT is tough. Smarter cybersecurity comes from not only knowing the language, but deciphering the benefits. How? EZ, Read Articles »

Clever Insights

Cyber intelligence, meet cyber savvy. Drawing from our deep experience and diverse network, we're here to make you think with our quality information, actionable applications, and illuminating ideas.

Customized Instruction

Rise to the challenge, and the top of the class. Use our online training tools covering both beginner and advanced cyber defense strategies and tactics as we guide you to become the next ACD acolyte.

Convenient Information

Want to dive deep into specifics, or float across a wide sea of topics? It's easy in our immersive 360° Spotlight section that brings together products, gurus, events, and innovators all under one roof.

Community Interaction

Active Cyber Defense is a giant leap for cybersecurity. Getting involved is the first step. Join the conversation here, follow us, and watch the future unfold. Contact or Partner with Us today.

Smarter Cybersecurity Starts with Active Cyber Defense

Discover how active cyber defense strategies are advancing the front lines of the cyber security industry at lightning speeds, and how you could benefit, too.

The Latest in Active Cyber Defense & Cybersecurity:

KDM Analytics’ Blade Risk Analysis Solution Powers A Secure Software Development Life Cycle and Supply Chain

Agile risk assessment at industrial scale Operational technology (OT) systems now connect operations and maintenance equipment to information technology (IT) infrastructures. Doing so enables increased automation and real-time, data-driven decision...

Active Cyber Crosswalks EO 14028

In my last article on the EO 14028 I mentioned that I thought there were several parallels between what the EO was calling out and some of the concepts and...

Active Cyber Reviews Executive Order 14028 – Improving the Nation’s Cybersecurity

Early this past summer 2021 a friend of mine was asking me about Executive Order 14028 on Improving the Nation’s Cybersecurity and I had to admit that I had largely ignored it....

What Roles Do Provenance and Reputation Play in “Authentic-By-Design” Approaches to Digital Content?

People make decisions every day that involve risk and uncertainty. Generally, we reconcile a variety of decision models using risk criteria often provided by organizational policies and/or guided by a...

Enabling Authenticity and Trust in the IoT Age Using Decentralized Systems

It has been over 30 years since the the web was introduced, and most of us are facing critical problems involving the security and privacy of our digital identity, our...

Authenticity-by-Design: Ensuring the Authenticity of Content and Identity

Current Security Trends Reveal Difficulties in Assuring Authenticity Recently I was thinking about some of the major security challenges and problems of 2020 and going forward into 2021 like the...

Orchestration for OT Systems – Is the Time Right?

My journey into OT security has led me to the question of can we safely operate automated security orchestration platforms in an OT environment or a converged OT/IT environment? I...

Using MBSE and Digital Twins to Design and Evaluate Cyber Resilient Systems

This election year spurred me into researching the cyber resilience of OT / IoT systems, of which electronic election systems are a subset. I discovered there was quite a bit...

Active Cyber Surveys the Standards Landscape for OT and IoT Systems Security

A Plethora of Standards and Guidance for OT / IoT Security In my research into OT and IoT systems security, I have come across a plethora of guidance and standards...