Indicators are probably the most frequently used object in the STIX 2 data model. At the heart of STIX Indicators is the STIX Patterning Language. STIX Patterning is a powerful tool capable of describing a wide spectrum of malicious attacker behavior in a machine-parsable format suitable for security automation. [...]
New Context participated in Borderless Cyber USA, June 21-22, 2017, in New York, where we heard from industry experts about the importance of changing the economics of cyber defense. Daniel Riedel, CEO, New Context, shares one of the key takeaways from the event. Three [...]
At New Context, we have long been committed to cyber threat intelligence (CTI), particularly as it relates to defining, sharing and automating information about threats. It should come as no surprise, then, that in June we will be on-site in New York City as sponsors of OASIS’ Borderless Cyber Conference. [...]
John-Mark Gurney, Principal Security Architect at New Context spoke at ICS Joint Working Group Spring 2017 in Minneapolis, MN on Patterning with STIX 2.0. View John-Mark's slides from the presentation.
In January of 2015, New Context was commissioned by a client to perform a review of existing machine readable threat feed frameworks. The customer, a user of Industrial Control System (ICS) hardware, is looking years into the future in hopes to forge a path in which complex patterns of [...]