Bob Gourley Provides Forecasts and Recommendations for Active Cyber Defense: Bob Gourley of Cognitio and former CTO of DIA talks about the key trends impacting cybersecurity and how active cyber defense can play a role in this recent interview with ActiveCyber. I recently connected with Bob Gourley at a cybersecurity conference and, knowing his reputation […]
My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts – the security of our smartphones. A recent article regarding Pentagon plans to approve a smartphone for use at the top secret level got me […]
Cyber Threat Intelligence (CTI) Gets Boost From Research At Georgetown University: Dr. Eric Burger of Georgetown University provides insightful views on what is happening in the CTI arena, areas of research his team is conducting, and challenges still facing CTI adoption and standards support in this recent interview with ActiveCyber. I recently trekked down to […]
Johns Hopkins University Applied Physics Lab (JHU APL) hosted a “Community Day” October 5th to highlight some of the research conducted on behalf of the Department of Homeland Security (DHS – Dr. Peter Fonash) and the National Security Agency (NSA – Mike Herring) on “Integrated Adaptive Cyber Defense” or IACD. Wende Peters of JHU APL, […]
Lessons learned: Former DHS CIO discusses challenges facing today’s government CIOs and CISOs and offers advice on proactive measures to combat cyber threats in this recent interview with ActiveCyber. I was delighted to sit down with Richard Spires recently to discuss his views on cybersecurity, how the recent OPM breach has changed things for government […]
Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of the security department of a large local bank when new system administrators were brought on board. The bank’s CISO had identified several security best practices […]
Are you looking for practical cybersecurity advice for what works and what doesn’t? Learn the “dos and don’ts” from the former CISO of CIA in this recent interview with ActiveCyber. I have been fortunate to interact with some of the leading security practitioners over my career and my latest interview guest, Bob Bigman, is one […]
Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors to identity theft. The breach has raised the ire of Congress with numerous hearings about what happened, why it happened, and what are “you” going to […]
Have you been wondering about what makes systems trustworthy and how to manage risk? We recently interviewed Dr. Ron Ross about the NIST Risk Management Framework, active cyber defense, and some of the other innovative projects that NIST is currently leading in the areas of cybersecurity. Dr. Ross is a long-time leader and visionary in the area […]




