10 02, 2017

How to Build DevOps Momentum

By | February 10th, 2017|Articles, Tips & Tricks|

For all of its challenges, 2016 was a year of inspiring innovation. SpaceX proved we can have reusable rockets by taking a page from a science fiction book and launching a rocket then landing it vertically on a moving boat. Enter a new era of space travel. Tesla sent all [...]

10 01, 2017

Cyber Threat Intelligence Committee Meetup During RSA 2017

By | January 10th, 2017|Events|

Once again New Context will be hosting a meeting of the Cyber Threat Intelligence OASIS technical committee during the RSA security conference. Cybersecurity experts representing the financial sector, healthcare, utilities, software providers, government, academia and nonprofits continue to define/develop the STIX/TAXII specifications as the solid foundation for standardizing threat information. [...]

27 11, 2016

New Context Predicts Strong Future for STIX, TAXII Open Standards for Cyber Threat Intelligence (CTI)

By | November 27th, 2016|Press Releases|

New Context, the leading provider of Lean Security for software and infrastructure development and sponsor of the OASIS Cyber Threat Intelligence (CTI) Technical Committee, today shared a strong, positive outlook for CTI open standards STIX and TAXII amid news that Soltra is being phased out. Despite a short term impact [...]

22 11, 2016

Why Every Business Should Embrace Automated Threat Response

By | November 22nd, 2016|Articles|

Image via Pixabay When it comes to information sharing in the workplace, it’s truly astounding to see how far the industrial world has come in recent years. Today, virtually every department in a company can access, analyze, and share information like never before — which is unlocking huge [...]

25 10, 2016

Security for Startups in a DevOps World Webinar Follow-up

By | October 25th, 2016|Articles, Webinar|

On October 18, Ben Tomhave, Security Architect for New Context talked about using Lean Security practices to integrate automated security into your DevOps processes and how to embed security practices into your company’s core culture. Didn’t have time to join us for our webinar? No worries! We know you’re busy! We [...]

Load More Posts