Spotlight

How Can Machine Learning Improve Your Cyber Posture? Learn how in this interview with Homer Strong of Cylance

Recently you can’t pick up a trade magazine or get a cyber news email without hearing about machine learning and AI. Besides being the current buzz, there are many legitimate...

Learn how Demisto applies machine learning to facilitate collaborative investigations beyond playbook automation

I am currently serving as the acting cybersecurity director and innovations officer for a large government contract. In these roles I have really come to appreciate the value of automation...

ActiveCyber Interviews Professor Ehab Al-Shaer on Advanced Research in Autonomous Cyber Defenses

In my research on various security topics I kept running across the work of Professor Al-Shaer, whether I was investigating SDN and security, security automation and orchestration, network resiliency, IoT...

ActiveCyber Interviews Ron Gula – Former Tenable CEO Embarks on New Venture in Cybersecurity Start-up Investing

Ron Gula has been at the forefront of the cybersecurity space for over 20 years, starting his career as a pentester for NSA and recently stepping down as the CEO...

ActiveCyber Interviews Jeanette Manfra – Assistant Secretary for the Office of Cybersecurity and Communications at DHS on Cybersecurity Strategies and Plans

The DHS Office of Cybersecurity and Communications is at the nexus of private-public information sharing as well as the executive agent for the national strategy for Critical Infrastructure Protection (CIP)...

ActiveCyber Interviews Tony Sager – Chief Evangelist of the Center for Internet Security – on Emerging Technologies for Active Defenses

The Center for Internet Security (CIS) is a non-profit organization that provides a treasure trove of information and assistance designed for the cyber practitioner, including assessment tools, recommended controls, best...

Government-Industry Partnerships Enable Rapid Growth in Security Automation Advances and Adoption

The Johns Hopkins Applied Physics Lab’s Integrated Adaptive Cyber Defense (IACD) project is maturing and moving into high gear as playbook automation begins to take hold across multiple government and...

Waverley Labs Pioneers Open Source Version of CSA’s Software-Defined Perimeter Specification

A Software-Defined Perimeter (SDP), as specified and endorsed by the Cloud Security Alliance (CSA), offers great potential in stopping or preventing many types of application attacks. Juanita Koilpillai, CEO of...

Start-up Rivetz Wants to Secure Internet Transactions Using Crypto Tokens that Provide Proof of Security

Mr. Steven Sprague, CEO of Rivetz Corp., discusses how the intersection of trusted computing and block chain provides a novel “proof of security” to protect high value transactions. Learn the...