Spotlight

University of Maryland 15th Annual Forum Highlights Research At Intersection of Cyber, Business, and Public Policy

I recently attended the Fifteenth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective at the University of Maryland. The forum was hosted by Professors Lawrence A....

Learn How the Army Research Lab Is Paving the Way to a Virtual Reality-Based Security Operations Center In This Interview With ActiveCyber.net

I remember reading a novel several years ago by Tom Clancy that featured virtual reality (VR) as part of the plot’s security operations center capabilities. I remember thinking how this...

Learn How DARPA Is Leading Research In Developing Resilient and Cyber-Assured Embedded Systems In This Active Cyber Interview

Finding the right security solution is often a difficult task, with many complex trade-offs to consider. Building a secure system is even more challenging as history has shown. Designing and...

Dr. Ron Ross of NIST Discusses New Multi-dimensional Cyber Protection Strategy In This Interview with Active Cyber

One of the issues I have with standards is that they often take on a life of their own – different from what their authors intended – and, eventually become...

Active Cyber Interviews Maryam Rahmani of Global Cyber Alliance – Learn About Free DMARC and DNS Security Offerings to Fight Internet Threats

There are many “free” cybersecurity tools out there but it seems like there are just a handful that actually are having a positive effect on the global security issues of...

Cybrary’s Free and For Pay Training Offerings Helps to Turn Cyber Novices Into Professionals and Professionals Into Experts. Learn More In This Interview with Ralph Sita

As a former SOC Director, I was always looking for ways to increase the skill levels of my team or get them the education needed for certification while on a...

CyberFence from Ultra Electronics 3eTI Helps Secure ICS Enclaves – Learn How In This Interview with Ben Garber of 3eTI

ICS, SCADA, OT, PIT and even IoT are all acronyms that define a class of systems which manage the flows of data between sensors, actuators and control systems. Over the...

Learn How New Context Services Is Building Secure Attribution and Threat Detection Into ICS Security

A year ago my engineer daughter sent me a podcast by RadioLab that described a potentially scary future created by advanced video and voice manipulation technology that would allow anyone...

Scalable Network Technologies’ Mod-Sim Tools Enable LVC Training and Testing of Active Defenses Across Different Cyber Terrains

My recent experience as a SOC director for a large enterprise has definitely upped my awareness of the need for a test and training environment where you can evaluate the...