Who is Innovating in the IoT Security Space – and How?
The Internet of Things (IoT) is a hotbed of innovation but I have been wondering who is really innovating in the IoT Security space. It seems to me that IoT...
The Internet of Things (IoT) is a hotbed of innovation but I have been wondering who is really innovating in the IoT Security space. It seems to me that IoT...
ActiveCyber’s Quest for the Holy Grail of Cyber Investment: Part 2 ActiveCyber is on a journey this month to find the holy grail formula for cybersecurity investment. In this article...
How Much Should I Invest in Cybersecurity? What Technology Should I Invest? Organizational risk managers and CISOs are faced with a seemingly bewildering set of investment choices and decision methods...
One of the fastest technology growth areas for cloud security involves what is known as a Cloud Access Security Broker (CASB). At my last count there are over 20 vendors...
My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts...
Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...
Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors...
Active Deception Through Cyber Maneuver The concept of dynamic identity can play a significant role in deception and adaptive defenses. Static mappings of identities create vulnerabilities that undermine protections and...
Cloud Computing – A Potpourri of Adaptive Defenses Cloud adoption is gaining momentum by leaps and bounds. How can you argue with the ubiquity and elasticity that cloud computing offers?...