23 09, 2016

Past Event: Borderless Cyber Europe

By | September 23rd, 2016|Events|

On September 8-9, 2016, New Context sponsored Borderless Cyber Europe. Daniel Riedel participated in a panel discussion on the key components of a successful cyber threat intelligence sharing program. The panel discussed the requirements for organizations to support the machine readable threat intelligence standard frameworks of STIX, CybOX and TAXII. [...]

20 09, 2016

A Glimmer of Hope for Cyberthreat Data Sharing

By | September 20th, 2016|Articles, Blog|

New Context’s partner, Soltra, was recently featured in an article on the value of cyber threat data sharing. “A new wrinkle offers hope. U.S. Bank and other institutions have begun using technology known as Soltra to generate machine-readable cyberthreat alerts that can automatically trigger actions in security software. This should [...]

9 09, 2016

Change the Incentive Model, Change the Culture

By | September 9th, 2016|Blog|

We all know there are problems with security. We all know that things aren't keeping pace or improving measurably and meaningfully at a rate or in a manner that most of us would deem sufficient or acceptable. Yet, all we seem to be doing is continuing to cast stones, castigate [...]

31 08, 2016

Beyond Self-Driven Collisions: Real Risk Lies in Cyberthreats to Autonomous Systems

By | August 31st, 2016|Articles|

Image via Pixabay.com As we march down the path of autonomous vehicles, both on the roads and in the air, collisions remain the dominant security issue of the news cycle. While we certainly want vehicles to avoid collisions whenever possible, we need to sound a much different alarm: [...]

26 08, 2016

The Heart of DevOps Is Cooperation

By | August 26th, 2016|Blog|

Image via Pixabay.com I've been reading a lot lately about generative culture at the suggestion of my boss. Apparently this topic has been popping up and circulating with frequency through DevOps circles in recent months, and seeing as I'm currently charged with doing "stuff" related to security and [...]

Load More Posts