Active Cyber Defense

ActiveCyber’s Quest for the Holy Grail of Cyber ROI

How Much Should I Invest in Cybersecurity? What Technology Should I Invest? Organizational risk managers and CISOs are faced with a seemingly bewildering set of investment choices and decision methods...

Cloud Access Security Brokerage

Cloud Access Security Brokers – The New Frontier of Active Cyber Defenses

One of the fastest technology growth areas for cloud security involves what is known as a Cloud Access Security Broker (CASB). At my last count there are over 20 vendors...

Adaptively secure smartphones

My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts...

Security Process Automation

Getting Proactive About User & System Management

Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...

Voice Recognition Security ID

Voice Biometrics – Plugging the OPM Breach

Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors...

delay tactic - confusing crossroads

The Three Ds: Deception, Detection, Delay Part 3

Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and...

cloud computing

Agile Cloud Security

Cloud Computing – A Potpourri of Adaptive Defenses Cloud adoption is gaining momentum by leaps and bounds. How can you argue with the ubiquity and elasticity that cloud computing offers?...

Cyber detection, deception and delay

The Three Ds: Deception, Detection, Delay

Active cyber defense offers deception, delay and persistent detection approaches to disrupt cyber attacks while also increasing the work factor for the attacker. By camouflaging defenses, deception can provide real-time...

adaptive cyber professional-f

Adaptive Endpoints

Living in a Hostile Cyber World “These are the times that try men’s souls…” – Thomas Paine You are the product manager for a new offering and you just clicked...