Many years ago I was hosting a series of workshops on a variety of security topics. One of those topics dealt with role-based, attribute-based, and policy-based access control approaches and I was lucky to get Mr. Dave Ferraiolo as one of my presenters for the workshop. Dave has been a long-time evangelist for NIST on […]
Step into the Forefront of Cybersecurity
Welcome to our Spotlight section. Here we showcase the most attention-worthy news and events, jaw-dropping products and top shelf services, rapidly rising players, and can’t-miss research and standards to keep you in the know when it comes to the cyber security industry, especially active cyber defense. We highlight how cutting edge active cyber defense strategies, products, and ideas apply to your field, whether you’re in computer security, cloud security, network security, IT security, adaptive security itself, or any other brand of cyber security. We’ve got you covered.
- Cyber Solutions Reviews – Discover new capabilities, functionality, tactics or strategies as we review and compare products and services offered by a diverse range of cybersecurity companies.
- Interviews – Learn from the experts and stand out individuals as we discuss their fresh perspectives on key concepts, debate hot topics, and reveal their success stories and tough lessons from their experience in the cyber security space.
- Cybersecurity News & Events – Get the inside scoop on the most interesting stuff happening right now in cybersecurity, or check out our calendar for a heads up so you don’t miss upcoming industry events.
- Research & Standards – Ensure that you’re up to date with the rules of the road, and gain insights from trending research, major reports, and more.
Adopting a new technology can be fun but also challenging, especially if the technology is new to the market and there isn’t a lot of veteran users around who can help teach. An emerging technology such as SOAR, which aims to converge security orchestration and automation, security incident response, and threat intelligence capabilities into single […]
Securing operational technology and IoT has just received a new compliance push as the DoD is targeting small businesses in its mandate for Cybersecurity Maturity Model Certification. Katie Arrington, special assistant to the Assistant Secretary of Defense for acquisition and cyber within the Office of the Undersecretary of Defense for Acquisition and Sustainment of the […]
Going, Gone: I attended the 10th annual Billington Cybersecurity Summit last week. This 2 day, sold out event with over 1100 attendees at the Washington Convention Center had more than 70 world class speakers and 60+ sponsors and exhibitors. There were also three “Innovation Zones” highlighting cyber products from the UK, Canada, and Israel. You […]
Tools that provide threat information sharing have been a hot technology over the last couple of years. However the tools are only as good as the information that is provided. And the information needs to be timely. And the more context about the threat, the better. And the need for industry outreach and information sharing […]
Autonomous vehicles (AVs) have been given considerable attention lately, and for good reason, as large tech giants such as Google, Apple, Amazon and of course Tesla have invested hundreds of millions into the development of AVs. More than 60 cities around the globe have driverless car testing programs either ongoing or in preparation, and nearly […]
Even though many of us are still in the dog days of summer, autumn is also just around the corner. Here are some of the active cyber highlight events for me over the summer of 2019 and some that I am looking forward to this autumn. Let me know about your active cyber highlights of […]
Black Hat 2019 has come and gone and I am still recovering from the sensory overload caused by the 19K+ attendees of this big conference amidst the backdrop of Las Vegas. My focus going into the conference was mainly on meeting startups… I was looking for something new – a solution that attacks the cyber […]
I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards – are generally quite rare. So I was excited when I met one – the subject of this interview – at a recent Dreamport session. […]