Expanding the Use Cases for STIX in Law Enforcement
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
Two sides are battling for your mind and soul on the Internet. It is also a global hybrid conflict we are facing.…
Common Transactive Services (CTS) permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any market.
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from…
Technical analysis of the Evilnum Campaign
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military…
In a striking revelation that underscores the escalating tensions between Russia and Ukraine, a coalition of Western intelligence agencies has brought to…
Last month I wrote about cybersecurity for the Commercial Facilities critical infrastructure sector. Physical security is an essential aspect of protecting critical…
With the right foundation and ongoing engagement, an ISAC can significantly enhance an organization's resilience to cybersecurity threats.
Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for…