Blog Archive

Man at computer with multiple screens
Automation
Jane Ginn

APIs Explained: From Endpoints to Authentication

APIs specify the types of requests that can be made, how to make them, and the data formats that should be used. APIs essentially act as a contract between different software applications, allowing them to communicate and share data.

Read More ยป
Reel of words showing fake news theme
Intelligence
Jane Ginn

Sandworm: Shadows in the Code

The film takes you on a journey through the intricate web of election interference and digital espionage, exploring the tactics, techniques, and procedures employed by this elusive group. It sheds light on the geopolitical implications of cyber warfare and raises pressing questions about security, sovereignty, and the future of conflict in the digital age.

Read More ยป

Chronological Archive

PART 1: Existential Cyber Threats and the Risk of a Destabilized World
PART 1: Existential Cyber Threats and the Risk of a Destabilized World
Doug DePeppe
YARA Rule Crafting: A Deep Dive into Signature-Based Threat Hunting Strategies
YARA Rule Crafting: A Deep Dive into Signature-Based Threat Hunting Strategies
Niels Groenveld
Bulletproofing Your APIs: Implementing OWASP Best Practices
Bulletproofing Your APIs: Implementing OWASP Best Practices
Jane Ginn
APIs Explained: From Endpoints to Authentication
APIs Explained: From Endpoints to Authentication
Jane Ginn
Maximizing ROI in Cybersecurity: Why Data-Driven Control Selection Matters
Maximizing ROI in Cybersecurity: Why Data-Driven Control Selection Matters
Jane Ginn
Synthesizing Signals: A Technical Overview of Multi-Vector Threat Analysis for the New Cyber Reality
Synthesizing Signals: A Technical Overview of Multi-Vector Threat Analysis for the New Cyber Reality
Jane Ginn
Sandworm: Shadows in the Code
Sandworm: Shadows in the Code
Jane Ginn
From Ballots to Bank Accounts:  How Russia is Disrupting Western Democracies and Economies
From Ballots to Bank Accounts: How Russia is Disrupting Western Democracies and Economies
Jane Ginn
Al-Qaeda’s Persistent Global Menace: Analyzing Recent Developments
Al-Qaeda’s Persistent Global Menace: Analyzing Recent Developments
Niels Groenveld
The Evolution of Generative AI: Insights from Stanford’s 2024 AI Index
The Evolution of Generative AI: Insights from Stanford’s 2024 AI Index
Jane Ginn
Iran’s Cyber Warfare: Analyzing the Impact of State-Sponsored Hacking on Global Security
Iran’s Cyber Warfare: Analyzing the Impact of State-Sponsored Hacking on Global Security
Niels Groenveld
Behind Enemy Lines: Inside the Operations of Russia’s Elite Cyber Espionage Units
Behind Enemy Lines: Inside the Operations of Russia’s Elite Cyber Espionage Units
Niels Groenveld
The Art of Believable, but Wrong Narratives in Chinese Propaganda Campaigns
The Art of Believable, but Wrong Narratives in Chinese Propaganda Campaigns
Jane Ginn
Dragon’s Den Dispatches: Decoding China’s Policy Playbook
Dragon’s Den Dispatches: Decoding China’s Policy Playbook
Niels Groenveld
Pyongyang’s Playbook: Insider Insights into North Korea’s Military Doctrine
Pyongyang’s Playbook: Insider Insights into North Korea’s Military Doctrine
Niels Groenveld
From Data to Defense: The Role of Knowledge Management in Cyber Threat Analysis
From Data to Defense: The Role of Knowledge Management in Cyber Threat Analysis
Jane Ginn
The Cyber Cold War: Separating Fact from Fiction in US-China Cyber Relations
The Cyber Cold War: Separating Fact from Fiction in US-China Cyber Relations
Jane Ginn
Beyond the Clouds: Safeguarding Our LEO Telecom Future from Cyber Sabotage
Beyond the Clouds: Safeguarding Our LEO Telecom Future from Cyber Sabotage
Jane Ginn
Knigsfot: The Covert Cyber Assault on Global Infrastructure
Knigsfot: The Covert Cyber Assault on Global Infrastructure
Jane Ginn
Digital Deception: How Cybercriminals Prey on the Elderly
Digital Deception: How Cybercriminals Prey on the Elderly
Jane Ginn
Kimsuky Abusing DMARC Protocol
Kimsuky Abusing DMARC Protocol
Jane Ginn
AI Tools for Cybersecurity
AI Tools for Cybersecurity
Jane Ginn
What to Watch For in 2024 Q3 & Q4
What to Watch For in 2024 Q3 & Q4
Jane Ginn
Expanding the Use Cases for STIX in Law Enforcement
Expanding the Use Cases for STIX in Law Enforcement
Niels Groenveld
Energy Sector Standard: Public Review
Energy Sector Standard: Public Review
Jane Ginn
Interoperability Village
Interoperability Village
Jane Ginn
A Pilot Program for Critical Infrastructure
A Pilot Program for Critical Infrastructure
Jane Ginn
Hunting Maturity: Hunt as a Pack
Hunting Maturity: Hunt as a Pack
Jane Ginn
Potential New EvilNum Campaign
Potential New EvilNum Campaign
Jane Ginn
Charting a New Course for Military Cyber Threat Intelligence
Charting a New Course for Military Cyber Threat Intelligence
Niels Groenveld
Android Phones of Ukranian Soldiers Weaponized by GRU
Android Phones of Ukranian Soldiers Weaponized by GRU
Niels Groenveld
Physical Security for Commercial Facilities
Physical Security for Commercial Facilities
Jane Ginn
So You Want To Set-up an ISAC
So You Want To Set-up an ISAC
Jane Ginn
Liberty is Not Easy
Liberty is Not Easy
Jane Ginn
Security Best Practices for Commercial Facilities
Security Best Practices for Commercial Facilities
Jane Ginn
Why Use STIX2.1 In Your Products
Why Use STIX2.1 In Your Products
Jane Ginn
Threat Hunting with The Hive, Cortex and MISP
Threat Hunting with The Hive, Cortex and MISP
Niels Groenveld
Leveraging STIX for Human Trafficking Intel: Technical Analysis
Leveraging STIX for Human Trafficking Intel: Technical Analysis
Niels Groenveld
Expanding the Use Cases of STIX and TAXII: National Security
Expanding the Use Cases of STIX and TAXII: National Security
Niels Groenveld
Common Security Advisory Framework Finalized
Common Security Advisory Framework Finalized
Jane Ginn
OASIS Advisor Elected to UN Economic Commission for Europe Specialist Team
OASIS Advisor Elected to UN Economic Commission for Europe Specialist Team
Jane Ginn
OpenC2 Architecture Specification
OpenC2 Architecture Specification
Jane Ginn
STIX2.1 Best Practices
STIX2.1 Best Practices
Jane Ginn
Secure QR Code Standard Published
Secure QR Code Standard Published
Jane Ginn
OASIS Open – New Board of Directors
OASIS Open – New Board of Directors
Jane Ginn
Final Published:  STIX2.1 & TAXII2.1
Final Published: STIX2.1 & TAXII2.1
Jane Ginn
Tragedy of the Cyberspace Commons
Tragedy of the Cyberspace Commons
Jane Ginn
A TIP for a Blockchain Community
A TIP for a Blockchain Community
Jane Ginn
JSON Abstract Data Notation Finalized
JSON Abstract Data Notation Finalized
Jane Ginn
A New Age of Data Rights Enforcement
A New Age of Data Rights Enforcement
Doug DePeppe
Borderless Cyber Conference Session
Borderless Cyber Conference Session
Jane Ginn
Moving STIX2.1 to ITU
Moving STIX2.1 to ITU
Jane Ginn
Social Media Misinformation Campaigns
Social Media Misinformation Campaigns
Jane Ginn
STIX Patterning Reference Guide
STIX Patterning Reference Guide
Jane Ginn
The Power of Collaboration: How We’re Shaping the Future of Cybersecurity Together
The Power of Collaboration: How We’re Shaping the Future of Cybersecurity Together
Jane Ginn
STIX2.1 Overview
STIX2.1 Overview
Jane Ginn
Online Self-Directed Training Modules: OSINT
Online Self-Directed Training Modules: OSINT
Jane Ginn
Aggregator
Aggregator
Jane Ginn
The Role of STIX in Strengthening Cyber Threat Intelligence within ISAOs
The Role of STIX in Strengthening Cyber Threat Intelligence within ISAOs
Jane Ginn
Guardians of the Digital Realm: The Crucial Role of Leadership in Cybersecurity
Guardians of the Digital Realm: The Crucial Role of Leadership in Cybersecurity
Jane Ginn
The Invisible Front: How Iran is Redefining Warfare in the Digital Age
The Invisible Front: How Iran is Redefining Warfare in the Digital Age
Jane Ginn
Major Tier 2 Route Leaks
Major Tier 2 Route Leaks
Jane Ginn
Election 2020 – Trolls are Ramping Up
Election 2020 – Trolls are Ramping Up
Jane Ginn
The “Mill Taste” Campaign
The “Mill Taste” Campaign
Jane Ginn
ENISA 2018 Threat Landscape Report Out
ENISA 2018 Threat Landscape Report Out
Jane Ginn
TAXII-Worker Tool Now Available
TAXII-Worker Tool Now Available
Jane Ginn
STIX 2.0 & TAXII 2.0 Finalized & Published
STIX 2.0 & TAXII 2.0 Finalized & Published
Jane Ginn
Cyber Threat Analysis in Complex Adaptive Systems
Cyber Threat Analysis in Complex Adaptive Systems
Jane Ginn
A Question for You, John Galt: Where is the CTI Blockchain?
A Question for You, John Galt: Where is the CTI Blockchain?
Jane Ginn
Reprint: The New “Hot” War in Geopolitics
Reprint: The New “Hot” War in Geopolitics
Jane Ginn
The 2017 International Information Sharing Conference in Rome
The 2017 International Information Sharing Conference in Rome
Jane Ginn
The Run For Technological Advantage
The Run For Technological Advantage
Jane Ginn
Using a TIP for a Training Program
Using a TIP for a Training Program
Jane Ginn
PART 3: A Third Sphere Model
PART 3: A Third Sphere Model
Doug DePeppe
PART 2: Fix the Cyber Market Disfunction
PART 2: Fix the Cyber Market Disfunction
Jane Ginn
Digital Memorial Tribute: Martin Zimmermann
Digital Memorial Tribute: Martin Zimmermann
Jane Ginn
Botnet Terminator
Botnet Terminator
Jane Ginn
Cybersecurity Intelligence Sharing: A Bill
Cybersecurity Intelligence Sharing: A Bill
Jane Ginn
Social Media Network Harvesting: Some considerations
Social Media Network Harvesting: Some considerations
Jane Ginn
DFARS Regulations Pushing Small Firms to Upgrade
DFARS Regulations Pushing Small Firms to Upgrade
Jane Ginn
The Key to Success for the Cybersecurity Framework
The Key to Success for the Cybersecurity Framework
Jane Ginn
Advances in Technology and Protection of the Rights of the Accused
Advances in Technology and Protection of the Rights of the Accused
Jane Ginn
Tools for Analyzing Threats to a WordPress Website
Tools for Analyzing Threats to a WordPress Website
Jane Ginn
Eternal Life of Malware
Eternal Life of Malware
Jane Ginn
A Preemptive Executive Order: Cybersecurity
A Preemptive Executive Order: Cybersecurity
Jane Ginn
Communications Acceptable Use Policies: Some Cybersecurity Considerations
Communications Acceptable Use Policies: Some Cybersecurity Considerations
Jane Ginn
The U.S. Government’s Top Priority for 2013; Or, it should be…
The U.S. Government’s Top Priority for 2013; Or, it should be…
Jane Ginn
Incubator of Catastrophe
Incubator of Catastrophe
Jane Ginn
The Good, Bad & Ugly of Cyber Security
The Good, Bad & Ugly of Cyber Security
Jane Ginn
Security Standards Council: New QIR Training
Security Standards Council: New QIR Training
Jane Ginn
Some Case Law on the Use of Social Media
Some Case Law on the Use of Social Media
Jane Ginn
Social Media and Data Integrity
Social Media and Data Integrity
Jane Ginn
Is it Worth it to do “Social Media”?
Is it Worth it to do “Social Media”?
Jane Ginn
Cybersecurity for Real Estate Agents
Cybersecurity for Real Estate Agents
Jane Ginn
ACTA vs. the Open Source Credo
ACTA vs. the Open Source Credo
Jane Ginn
Translate ยป