Run-time Cyber Economics – Applying Risk-Adaptive Defenses
Well, it has been a long break since the last article of this series but I feel duty-bound to do this third article on cybersecurity investment since I find the...
Well, it has been a long break since the last article of this series but I feel duty-bound to do this third article on cybersecurity investment since I find the...
Quantum computing is highly desired by the supercomputing community for solving a wide range of problems that are extremely difficult (if not impossible) to solve today. One example of a...
The Internet of Things (IoT) is a hotbed of innovation but I have been wondering who is really innovating in the IoT Security space. It seems to me that IoT...
ActiveCyber’s Quest for the Holy Grail of Cyber Investment: Part 2 ActiveCyber is on a journey this month to find the holy grail formula for cybersecurity investment. In this article...
How Much Should I Invest in Cybersecurity? What Technology Should I Invest? Organizational risk managers and CISOs are faced with a seemingly bewildering set of investment choices and decision methods...
One of the fastest technology growth areas for cloud security involves what is known as a Cloud Access Security Broker (CASB). At my last count there are over 20 vendors...
My Wishlist For A High Assurance, Adaptive Smartphone Since this is cyber security awareness month, I thought I would do an article about something near and dear to our hearts...
Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...
Wanted: Adaptive Multi-Factor Authentication The not-so-recent OPM data breach has resulted in some critical repercussions, not the least of which is the exposure of millions of government employees and contractors...