Articles

Security Capabilities Needed for OT and IIoT Systems

My Top 10 Security Capability Recommendations for 2020 As reported in a previous article here at ActiveCyber.net, there are some major trends that are affecting the OT systems of today...

2020 – The Year of Insecurity of the Critical Infrastructure

A Growing Security Threat Against Critical Infrastructure In 2009 there were less than a billion IoT devices in use. According to Statista, that number is expected to increase to more...

Business and Technology Trends Impacting OT Systems Security

Industry 4.0 Ushers In the Age of Digitalization Industry 4.0, or the fourth wave of the Industrial Revolution, leverages connectivity and autonomous operation to create robust Industrial IoT (IIoT) applications...

Trends and Challenges Shaping the Security Look of OT and IoT Systems

Over the past few years, I have been hearing a lot about the security issues and, therefore, the security requirements for Operational Technology (OT), as well as for the Internet...

Bulb Security Lights the Way to Better Mobile Security

I have always had a deep appreciation for the skills of a good pentester. However, elite pentesters – those who rule their craft and make magic happen on their keyboards...

Learn How D3 Security’s SOAR Platform Transforms SOC Operations In This Interview With ActiveCyber.net

I have been saying for a while that security automation, orchestration, and response (SOAR) tools are key enablers for tranforming SOC operations. And these tools have matured from glorified python...

AI and Mod-Sim Tools Create Insight for Better Cyber Investing

My recent SOC Service Manager experience got me to thinking about cyber tool sprawl and the return on investment that my customer was getting for their cyber investment. There is...

ActiveCyber Interviews Tony Sager – Chief Evangelist of the Center for Internet Security – on Emerging Technologies for Active Defenses

The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best...

Government-Industry Partnerships Enable Rapid Growth in Security Automation Advances and Adoption

The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and...