14 02, 2017

RSA 2017 Features Huge Demonstration of Support for Cyber Threat Intelligence

By | February 14th, 2017|Press Releases|

RSA 2017 Features Huge Demonstration of Support for Cyber Threat Intelligence, Encryption, and Cryptography Standards as 24 OASIS Member Companies Collaborate Bay Dynamics, DFLabs, EclecticIQ, Fujitsu, IBM, LookingGlass, New Context, NC4, ThreatConnect, ThreatQuotient, TruSTAR, and Verisign Demo STIX and TAXII Support. Cryptsoft, Feitan, Fornetix, Hancom Secure, Hewlett Packard Enterprise (HPE), [...]

10 02, 2017

How to Build DevOps Momentum

By | February 10th, 2017|Articles, Tips & Tricks|

For all of its challenges, 2016 was a year of inspiring innovation. SpaceX proved we can have reusable rockets by taking a page from a science fiction book and launching a rocket then landing it vertically on a moving boat. Enter a new era of space travel. Tesla sent all [...]

26 01, 2017

DevOps and Separation of Duties

By | January 26th, 2017|Blog|

Despite the rapid growth of DevOps practices throughout various industries, there still seems to be a fair amount of trepidation, particularly among security practitioners and auditors. One of the first concerns that pops up is a blurted out “You can’t do DevOps here! It violates separation of duties!” Interestingly, this [...]

18 01, 2017

“Minimum Viable” MUST Include Security

By | January 18th, 2017|Blog|

If you're a startup trying to get a product off the ground, you've probably been told to build an "MVP" - a minimum viable product - as promoted by the Lean Startup methodology. This translates into products being rapidly developed with the least number of features necessary to make an initial sale [...]

10 01, 2017

Cyber Threat Intelligence Committee Meetup During RSA 2017

By | January 10th, 2017|Events|

Once again New Context will be hosting a meeting of the Cyber Threat Intelligence OASIS technical committee during the RSA security conference. Cybersecurity experts representing the financial sector, healthcare, utilities, software providers, government, academia and nonprofits continue to define/develop the STIX/TAXII specifications as the solid foundation for standardizing threat information. [...]

Load More Posts