I remember reading not long ago a news snippet about NSA deprecating some aspects of Elliptic Curve Cryptography due to quantum computing. Quantum computing has been futuristic for quite some time but it appears that it is starting to mature quickly. I decided to ask two of my crypto friends for the story behind this […]
Learn about Intel Security’s approach to dynamic defenses and being “Securely Connected” in this ActiveCyber interview with two top security leaders from Intel Security. Intel Security has a long legacy in cybersecurity and continues to be a security innovator and consistent MQ leader for a variety of security product areas. Recently, I was able to […]
ActiveCyber’s Quest for the Holy Grail of Cyber Investment: Part 2 ActiveCyber is on a journey this month to find the holy grail formula for cybersecurity investment. In this article we report about what we learn at our second and third stops on this journey. (Go here to learn about our first stop on this […]
Every organization operates a networked ecosystem of suppliers, customers, internal sites, and governance bodies connected via a digital network. How does network reputation provide insight into an organization’s security posture within the ecosystem and provide investment incentives to improve its posture? What parameters are useful in establishing a network reputation metric and how can machine […]
Professor Larry Gordon of the University of Maryland Discusses the Gordon-Loeb Cybersecurity Investment Model in this interview with ActiveCyber. Learn how economics, cyber, and mathematics came together at the genesis of this model and how to use this model to guide your cyber investment strategy. I was delighted when Professor Gordon invited me to lunch […]
How Much Should I Invest in Cybersecurity? What Technology Should I Invest? Organizational risk managers and CISOs are faced with a seemingly bewildering set of investment choices and decision methods for determining the monetary amount and best technical options for cybersecurity investment. Cybersecurity investment business cases are often hard to justify since cyber operations usually […]
Matt Barrett of the National Institute of Standards and Technology (NIST) Discusses the NIST Cybersecurity Framework and Adaptive Cyber Defenses. Learn how the Framework is evolving and how your organization can use it in this interview with ActiveCyber. Matt and I crossed paths at a conference many years ago and I have always held his […]
One of the fastest technology growth areas for cloud security involves what is known as a Cloud Access Security Broker (CASB). At my last count there are over 20 vendors that currently occupy this market space, which only emerged from the lab in 2010/2011 [See the non-comprehensive list of vendors at end of this article]. […]
Discover How Splunk Can Help You Build Active Cyber Defenses: Rob Frazier, Certified Splunk Architect and accomplished security professional reveals how Splunk can play a vital role in combating threats as part of active cyber defense in this recent interview with ActiveCyber. Rob and I first met in the early 1990’s when we were co-workers […]




