The operational tempo of the enterprise in cyberspace demands engagement of protections in cyber-relevant time. No longer can enterprises depend on human-driven processes to address the ever-increasing number of cyber events across the exponential number of devices that must be managed. Innovations in cyber threat intelligence; predictive analytics; situational awareness through artificial intelligence / machine […]
Curt Dukes of NSA discusses NSA’s Active Cyber Defense (ACD) program and highlights how academia, industry and government are moving forward to “achieve the key ACD goal of defensive response within cyber-relevant time.” Learn about the genesis, the goals, and the accomplishments of this program to date in the interview below with ActiveCyber.net. If you […]
Mike Brown, CTO of ISARA Corporation Discusses ISARA’s offerings for Quantum Safe Computing. Learn why you need to plan for a quantum-safe transition now for your applications and some of the options that are available in this interview with ActiveCyber. Back in September, wanting to learn more about quantum safe computing, I attended the 4th […]
Well, it has been a long break since the last article of this series but I feel duty-bound to do this third article on cybersecurity investment since I find the possibilities resulting from a “risk-adaptive” security approach to be compelling. Generally cyber defenses must be pre-planned with cost-benefits carefully weighed prior to investing in new […]
Quantum computing is highly desired by the supercomputing community for solving a wide range of problems that are extremely difficult (if not impossible) to solve today. One example of a hard problem that will become much easier due to quantum computing is factoring large prime numbers. This hard problem forms the basis of much of […]
The Internet of Things (IoT) is a hotbed of innovation but I have been wondering who is really innovating in the IoT Security space. It seems to me that IoT security calls for highly adaptive measures and therefore is a good fit for those who visit this site. Recently I was contacted by Cassie Phillips […]
Learn about the expansive portfolio of cyber security research going on at DHS HSARPA as Dr. Doug Maughan lays out the many cyber research programs planned and underway to tackle cyber’s tough problems in this interview with ActiveCyber. I attended the DHS HSARPA Cyber R&D Showcase held in Washington, D.C. a little while back and […]
I remember reading not long ago a news snippet about NSA deprecating some aspects of Elliptic Curve Cryptography due to quantum computing. Quantum computing has been futuristic for quite some time but it appears that it is starting to mature quickly. I decided to ask two of my crypto friends for the story behind this […]
Learn about Intel Security’s approach to dynamic defenses and being “Securely Connected” in this ActiveCyber interview with two top security leaders from Intel Security. Intel Security has a long legacy in cybersecurity and continues to be a security innovator and consistent MQ leader for a variety of security product areas. Recently, I was able to […]




