Articles

AI at the Edge of a New Industrial Era: The Global Race to Build the Infrastructure of Intelligence – Part 1

February 24, 2026 AI has been the most dominant technology theme for several years now. It seems to get even more attention recently as the race to AI dominance heats...

AI at the Edge of a New Industrial Era: The Global Race to Build the Infrastructure of Intelligence – Part 2

February 24, 2026 AI has been the most dominant technology theme for several years now. It seems to get even more attention recently as the race to AI dominance heats...

ActiveCyber Recognizes the 25th Anniversary of the Gordon-Loeb Model for Cyber Investment

February 12, 2026 Each January for the last 10 years I have happily accepted an invite to attend the Annual Cybersecurity Forum that is co-sponsored by the University of Maryland’s...

The (In)Security Consequences of Artificial Intelligence: Active Cyber™ Explores AI-Based Identity Fraud, Extortion, Disinformation, and the Urgent Need for Trusted Infrastructure

January 27, 2026 We have all been bombarded over the last few years about the race to Artificial General Intelligence (AGI) and super AGI and how it is a race...

Active Cyber™ Takes a Fresh Look At Space Cyber Security

September 19, 2024 I have taken notice lately of the number of headlines that are discussing cyberspace threats in space. Well, not just threats in cyberspace space but also kinetic...

Looking at the AI Impacts on the Cyber Kill Chain Frameworks

January 15, 2024 Lately, I have been wondering about the emerging threat factors that are impacting the cyber kill chain and how the cyber kill chain and related frameworks [MITRE...

Active Cyber™ Picks Top 3 Cybersecurity Challenges for 2023

As 2022 ended and we rolled into another year, I began to see the yearly editions of the top data breaches, top threats, and top privacy fines from different cyber...

Cyber Readiness Needs a Holistic Assessment Approach at the Edge

I have been seeing quite a number of references lately to the terms “cyber ready” and “cyber readiness.” Some of these references reflect an enterprise view of readiness – defined...

The Authenticity of Cyber Attribution – Who Do You Believe?

I have been thinking a lot lately about the accuracy of cyber attack attribution. Most cyber forensic analysts and threat intelligence specialists will tell you that cyber attack attribution done...