30 05, 2019

New Context Launches LS/IQ Lite

By |2019-06-03T14:07:49-07:00May 30th, 2019|Categories: featured, Press Releases|Tags: |

LS/IQ Lite is designed to unleash the power of Lean Security®, a consistent framework to apply Secure DevOps at scale. SAN FRANCISCO--(BUSINESS WIRE)--New Context, a leading innovator in cybersecurity for highly regulated industries, today announced the launch of LS/IQ Lite, a complimentary subset of LS/IQ. It is designed to [...]

3 04, 2019

Using STIX Patterns to Search Binary Data in ELK

By |2019-04-03T08:43:33-07:00April 3rd, 2019|Categories: Blog, featured|Tags: , , |

In the area of cyber threat intelligence, indicators based on deep understanding of compiled executables usually take a back seat to data artifacts such as log messages, configurations, file hashes, or network flow data. Binary patterns can be an incredibly useful tool to identify threats in executables and other [...]

28 03, 2019

Unpacking Lean Security

By |2019-03-28T09:15:21-07:00March 28th, 2019|Categories: Blog, featured|Tags: , , , |

New Context was founded in 2013 with the vision to keep the connected world safe and the mission to use Lean Security™ to automate the orchestration, governance and protection of critical infrastructure. Since then, we have been serving Fortune 500 companies and government entities by building [...]

4 03, 2019

Live Recording of CISO/Security Vendor Relationship Podcast in SF

By |2019-03-04T21:09:14-07:00March 4th, 2019|Categories: Events, featured|Tags: , |

Mark your calendar! New Context is proud to again sponsor Live Recording of CISO/Security Vendor Relationship Series and Podcast. Get a chance to see the CISO/Security Vendor Relationship Podcast recording in person! Your regular hosts David Spark, producer of the podcast and series will be there along with Mike [...]

12 02, 2019

Security Automation in OT Networks

By |2019-02-12T08:40:26-07:00February 12th, 2019|Categories: Articles, Events, featured|Tags: , , , |

Last week at DistribuTECH 2019, I had the opportunity to participate in a panel discussion on How AI and Machine-to-Machine Learning Are Enabling Cybersecurity Threat Intelligence. I was joined by fellow members of the California Energy Systems for the 21st Century (CES-21) program. Over the past 4 years, [...]

Load More Posts