Spotlight

Waverley Labs Pioneers Open Source Version of CSA’s Software-Defined Perimeter Specification

A Software-Defined Perimeter (SDP), as specified and endorsed by the Cloud Security Alliance (CSA), offers great potential in stopping or preventing many types of application attacks. Juanita Koilpillai, CEO of...

Start-up Rivetz Wants to Secure Internet Transactions Using Crypto Tokens that Provide Proof of Security

Mr. Steven Sprague, CEO of Rivetz Corp., discusses how the intersection of trusted computing and block chain provides a novel “proof of security” to protect high value transactions. Learn the...

ActiveCyber Interviews Scott Musman, MITRE, About Applying Gaming Techniques to Cyber Risk Estimation

Mr. Scott Musman discusses how game theory provides important contributions to cyber risk analysis modeling and to understanding mission impacts resulting from cyber attack. Learn the background and details of...

ActiveCyber Interviews Professor Jintai Ding – Author of Post-Quantum Safe Crypto Algorithm and PAKE Protocol

Professor Jintai Ding discusses his ground-breaking work in the complex world of post-quantum cryptography. Learn the background behind the development of his protocol for password authenticated key agreement (PAKE) that...

ActiveCyber Interviews Oliver Friedrichs, CEO of Phantom, on Security Orchestration

CEO Oliver Friedrichs discusses the evolution of Phantom – a security orchestration tool company that is riding high on technical innovation awards and respect from early adopters. Learn how you...

ActiveCyber Interviews Professor Kanta Matsuura on Blockchain and BSafe.network

Professor Kanta Matsuura reviews the emerging research conducted by a wide range of academic institutions involving blockchain technology as part of the on-going BSafe.network initiative. Discover how this leading researcher...

ActiveCyber Interview with Kris Lovejoy – CEO of BluVector, Inc.

Kris Lovejoy discusses how BluVector’s patented machine learning technology is applied to detect zero day threats in real-time. Find out how your incident response team can accelerate time from detection...

ActiveCyber Interview with Mr. Curtis Dukes – Deputy National Manager for National Security Systems at NSA

Curt Dukes of NSA discusses NSA’s Active Cyber Defense (ACD) program and highlights how academia, industry and government are moving forward to “achieve the key ACD goal of defensive response...

Interview with Mike Brown, CTO of ISARA Corporation on Quantum Cryptography

Mike Brown, CTO of ISARA Corporation Discusses ISARA’s offerings for Quantum Safe Computing. Learn why you need to plan for a quantum-safe transition now for your applications and some of...