At New Context, we have long been committed to cyber threat intelligence (CTI), particularly as it relates to defining, sharing and automating information about threats. It should come as no surprise, then, that in June we will be on-site in New York City as sponsors of OASIS’ Borderless Cyber Conference. [...]
By Daniel Riedel and Andrew Storms For all of the benefits of artificial intelligence (AI), the best minds, organizations and technologists in every corner of the globe will still struggle with one very significant challenge: How do we support AI at scale? The current state of AI has clear limits. [...]
Image via Wikipedia Commons Earlier this year, I explored how important attribution is within critical infrastructure systems, so that we can understand, without a doubt, all actors and their actions within these important environments. We do this by auditing every interaction of an actor in the ecosystem and [...]
John-Mark Gurney, Principal Security Architect at New Context spoke at ICS Joint Working Group Spring 2017 in Minneapolis, MN on Patterning with STIX 2.0. View John-Mark's slides from the presentation.
In January of 2015, New Context was commissioned by a client to perform a review of existing machine readable threat feed frameworks. The customer, a user of Industrial Control System (ICS) hardware, is looking years into the future in hopes to forge a path in which complex patterns of [...]