Spotlight: Cybersecurity ResearchI thought for this tax day (April 15) I would take an accounting of the articles and interviews I have written or conducted since the inception of ActiveCyber.net. Since the initial launch of ActiveCyber.net in 2014, Active Cyber has presented 30 articles and 41 interviews to readers, as shown in the table below. Most of the focus has been on active defenses with some forays into risk economics, risk management, quantum cryptography, IoT/ICS, SOC operations and VR systems, blockchain, cyber forensics, and cyber training. Coming up over the next few months I plan to do a deeper dive into ICS/IoT/IIoT security, develop some insight into the security of autonomous systems, go farther into the intricacies of securing blockchain, investigate trusted systems, explore the human side of active defenses, and take a look at security and privacy issues around augmented reality / virtual reality. Let me know if you are interested in guest blogging or doing an interview on a topic or present an offering in one of these areas.


 

# Title of Article or Interview (linked to post) Category / Menu path Date Pub
1 DHS S&T Lays Out a Broad Yet Innovative Portfolio of Cybersecurity Research In This Year’s Showcase Spotlight, Spotlight – Interviews, Spotlight – Research & Standards Published
2019/03/15
2 Learn How D3 Security’s SOAR Platform Transforms SOC Operations In This Interview With ActiveCyber.net Automated Orchestration, Spotlight – Interviews Published
2019/03/04
3 Not Going to RSA? Check Out These Upcoming Cyber Conferences Spotlight, Spotlight – Cybersecurity News & Events Published
2019/02/25
4 Mr. Robert Rahmer, Program Manager of IARPA’s CAUSE Program, Discusses Progress in Cyber Event Forecasting Research Spotlight, Spotlight – Interviews, Spotlight – Research & Standards Published
2019/02/19
5 Learn How Cybersecurity Dynamics Lays The Foundation For Advanced Cybersecurity Defenses In This Active Cyber Interview with Professor Shouhuai Xu of UTSA Spotlight, Spotlight – Interviews Published
2019/02/14
6 Digital Forensics Pioneer Jim Christy Provides His Unique Insights In This Interview with Active Cyber™ Spotlight, Spotlight – Interviews Published
2019/02/11
7 Cyber Risk Assessment Takes On An Actionable Approach In This Methodology by Dr. Charles Harry of UMD Spotlight, Spotlight – Interviews Published
2019/02/04
8 University of Maryland 15th Annual Forum Highlights Research At Intersection of Cyber, Business, and Public Policy Spotlight, Spotlight – Cybersecurity News & Events, Spotlight – Research & Standards Published
2019/01/23
9 Learn How the Army Research Lab Is Paving the Way to a Virtual Reality-Based Security Operations Center In This Interview With ActiveCyber.net Spotlight, Spotlight – Interviews Published
2019/01/02
10 Learn How DARPA Is Leading Research In Developing Resilient and Cyber-Assured Embedded Systems In This Active Cyber Interview Spotlight, Spotlight – Interviews Published
2018/12/05
11 Dr. Ron Ross of NIST Discusses New Multi-dimensional Cyber Protection Strategy In This Interview with Active Cyber Spotlight, Spotlight – Interviews Published
2018/11/27
12 Active Cyber Interviews Maryam Rahmani of Global Cyber Alliance – Learn About Free DMARC and DNS Security Offerings to Fight Internet Threats Spotlight, Spotlight – Interviews Published
2018/11/20
13 Cybrary’s Free and For Pay Training Offerings Helps to Turn Cyber Novices Into Professionals and Professionals Into Experts. Learn More In This Interview with Ralph Sita Spotlight, Spotlight – Interviews Published
2018/11/08
14 CyberFence from Ultra Electronics 3eTI Helps Secure ICS Enclaves – Learn How In This Interview with Ben Garber of 3eTI Spotlight, Spotlight – Interviews, Spotlight – Product Reviews Published
2018/09/18
15 AI and Mod-Sim Tools Create Insight for Better Cyber Investing Active Cyber Defense, Automated Orchestration Published
2018/09/12
16 Learn How New Context Services Is Building Secure Attribution and Threat Detection Into ICS Security Spotlight, Spotlight – Interviews Published
2018/08/15
17 Scalable Network Technologies’ Mod-Sim Tools Enable LVC Training and Testing of Active Defenses Across Different Cyber Terrains Spotlight, Spotlight – Interviews Published
2018/07/24
18 How Can Machine Learning Improve Your Cyber Posture? Learn how in this interview with Homer Strong of Cylance Spotlight, Spotlight – Interviews Published
2018/04/23
19 Learn how Demisto applies machine learning to facilitate collaborative investigations beyond playbook automation Spotlight, Spotlight – Interviews Published
2018/01/30
20 ActiveCyber Interviews Professor Ehab Al-Shaer on Advanced Research in Autonomous Cyber Defenses Spotlight, Spotlight – Interviews, Spotlight – Research & Standards Published
2017/12/21
21 ActiveCyber Interviews Ron Gula – Former Tenable CEO Embarks on New Venture in Cybersecurity Start-up Investing Spotlight, Spotlight – Interviews Published
2017/11/27
22 ActiveCyber Interviews Jeanette Manfra – Assistant Secretary for the Office of Cybersecurity and Communications at DHS on Cybersecurity Strategies and Plans Spotlight, Spotlight – Interviews Published
2017/11/20
23 ActiveCyber Interviews Tony Sager – Chief Evangelist of the Center for Internet Security – on Emerging Technologies for Active Defenses Active Cyber Defense, Spotlight, Spotlight – Interviews Published
2017/11/07
24 Government-Industry Partnerships Enable Rapid Growth in Security Automation Advances and Adoption Active Cyber Defense, Spotlight, Spotlight – Interviews Published
2017/10/09
25 Security Orchestration: Looking Forward Automated Orchestration Published
2017/09/27
26 Waverley Labs Pioneers Open Source Version of CSA’s Software-Defined Perimeter Specification Spotlight, Spotlight – Interviews Published
2017/08/21
27 Start-up Rivetz Wants to Secure Internet Transactions Using Crypto Tokens that Provide Proof of Security Spotlight, Spotlight – Interviews Published
2017/08/14
28 ActiveCyber Interviews Scott Musman, MITRE, About Applying Gaming Techniques to Cyber Risk Estimation Spotlight, Spotlight – Interviews Published
2017/06/12
29 ActiveCyber Interviews Professor Jintai Ding – Author of Post-Quantum Safe Crypto Algorithm and PAKE Protocol Spotlight, Spotlight – Interviews Published
2017/05/23
30 ActiveCyber Interviews Oliver Friedrichs, CEO of Phantom, on Security Orchestration Spotlight, Spotlight – Interviews Published
2017/04/11
31 ActiveCyber Interviews Professor Kanta Matsuura on Blockchain and BSafe.network Spotlight, Spotlight – Interviews Published
2017/03/21
32 ActiveCyber Interview with Kris Lovejoy – CEO of BluVector, Inc. Spotlight – Interviews Published
2017/03/15
33 New Innovations Drive Active Cyber Defense Active Cyber Defense, Articles Published
2017/01/03
34 ActiveCyber Interview with Mr. Curtis Dukes – Deputy National Manager for National Security Systems at NSA Spotlight, Spotlight – Interviews Published
2016/11/15
35 Interview with Mike Brown, CTO of ISARA Corporation on Quantum Cryptography Spotlight, Spotlight – Interviews Published
2016/11/01
36 Run-time Cyber Economics – Applying Risk-Adaptive Defenses Active Cyber Defense, Articles Published
2016/07/26
37 The Rise of Quantum Computers – The Current State of Cryptographic Affairs Active Cyber Defense, Articles Published
2016/05/31
38 Who is Innovating in the IoT Security Space – and How? Active Cyber Defense, Articles Published
2016/05/17
39 ActiveCyber Interview With Dr. Doug Maughan – DHS HSARPA Cyber Director Spotlight – Interviews, Spotlight – Research & Standards Published
2016/04/21
40 Are We There Yet? A Walk Through Quantum Capabilities Today Spotlight, Spotlight – Research & Standards Published
2016/04/19
41 ActiveCyber Interview with Steve Orrin and Ned Miller — Security Leaders for Intel Security Spotlight, Spotlight – Interviews Published
2016/04/04
42 Continuing the Quest for How to Invest in Cybersecurity – Stops 2 and 3 Active Cyber Defense, Articles Published
2016/03/22
43 How Can Global Network Reputation Scores Be Used To Guide Cyber Investment? ActiveCyber Interviews Leading Researcher – Mingyan Liu – To Find Out Spotlight, Spotlight – Interviews Published
2016/03/22
44 Learn the Fundamentals of the Gordon-Loeb Cyber Investment Model in this Interview with Professor Gordon Spotlight, Spotlight – Interviews Published
2016/03/22
45 ActiveCyber’s Quest for the Holy Grail of Cyber ROI Active Cyber Defense, Articles Published
2016/03/14
46 Interview with Matt Barrett of NIST on the Cybersecurity Framework Spotlight, Spotlight – Interviews Published
2016/02/07
47 Cloud Access Security Brokers – The New Frontier of Active Cyber Defenses Agile Cloud, Articles Published
2016/02/01
48 ActiveCyber Interview with Rob Frazier – Certified Splunk Architect Spotlight, Spotlight – Interviews Published
2015/12/02
49 ActiveCyber Interview with Bob Gourley – Former CTO of DIA Spotlight, Spotlight – Interviews Published
2015/10/30
50 Adaptively secure smartphones Adaptive Endpoint, Articles Published
2015/10/28
51 Interview with Dr. Eric Burger: the State of Cyber Threat Intelligence Research / STIX/TAXII Spotlight, Spotlight – Interviews Published
2015/10/09
52 JHU APL Community Day Lays Out Research Roadmap for Active Cyber Defense Spotlight, Spotlight – Research & Standards Published
2015/10/08
53 Interview with Richard Spires, Former CIO of DHS Spotlight, Spotlight – Interviews Published
2015/09/29
54 Getting Proactive About User & System Management Articles, Automated Orchestration Published
2015/09/04
55 Interview with Bob Bigman, Former CISO of CIA Spotlight, Spotlight – Interviews Published
2015/08/20
56 Voice Biometrics – Plugging the OPM Breach Adaptive Endpoint, Articles Published
2015/08/12
57 Interview with NIST’s Ron Ross Spotlight – Interviews Published
2015/08/04
58 Spotlight On… Active Cyber Defense Events – Past, Present and Future Spotlight – Cybersecurity News & Events Published
2015/06/30
59 Spotlight: Something New for the Internet of Things Spotlight – Product Reviews Published
2014/11/19
60 Spotlight: US Federal Research on Active Cyber for 2015 Spotlight – Research & Standards Published
2014/11/18
61 The Three Ds: Deception, Detection, Delay Part 3 Deception Detection & Delay Published
2014/11/18
62 Agile Cloud Security Agile Cloud Published
2014/11/15
63 The Three Ds: Deception, Detection, Delay Deception Detection & Delay Published
2014/11/15
64 Adaptive Endpoints Adaptive Endpoint Published
2014/11/15
65 Automated Orchestration Automated Orchestration Published
2014/11/15
66 The Three Ds: Deception, Detection, Delay Part 2 Deception Detection & Delay Published
2014/11/15
67 Active Cyber Defense Capability Areas Active Cyber Defense Published
2014/11/15
68 What is Active Cyber Defense? Active Cyber Defense Published
2014/11/05
69 Intel-based Defenses Intel-Based Defenses Published
2014/10/25
70 Intel-Based Defenses Part 2 Intel-Based Defenses Published
2014/10/25
71 Intelligent Networks Intelligent Networks Published
2014/10/16

And thanks for checking out ActiveCyber.net! Please give us your feedback because we’d love to know some topics you’d like to hear about in the area of active cyber defenses, PQ cryptography, risk assessment and modeling, autonomous security, digital forensics, securing ICS / IIoT and IoT systems, or other security topics. Also, email marketing@activecyber.net if you’re interested in interviewing or advertising with us at Active Cyber™.