Cybersecurity Best Practices for Commercial Facilities
Property managers of commercial facilities like shopping centers, sports stadiums, casinos, churches, and movie complexes face unique cybersecurity challenges. These…
Why Use STIX2.1 In Your Products
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it…
Threat Hunting with TheHive, Cortex and MISP
Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture.…
Leveraging STIX and TAXII for Human Trafficking Intelligence: A Technical Analysis
By: Niels Groeneveld, OSINT AnalystJanuary 29, 2023 Human trafficking is a complex and pervasive problem that requires a multi-disciplinary approach…
Expanding the Use Cases for STIX and TAXII in Law Enforcement Threat Intelligence Sharing
STIX and TAXII are widely recognized as key frameworks for the sharing and exchange of cyber threat intelligence between organizations.…
Expanding the Use Cases of STIX and TAXII: Leveraging Threat Intelligence Frameworks for National Security and Intelligence Analysis
As the world becomes increasingly interconnected and dependent on technology, the need for robust cyber threat intelligence (CTI) sharing has…
Common Security Advisory Framework (CASF) 2.0 Finalized
Boston, MA, USA, 21 November, 2022 – OASIS Open, the international open source and standards consortium, announced the approval of…
OASIS Advisor Elected to UN Economic Commission for Europe Specialist Team
Congratulations to Harm Jan van Burg, Senior Policy Advisor, International Standards at OASIS Open, on his election as Vice Chair…
OpenC2 Architecture Specification
OASIS is pleased to announce that Open Command and Control (OpenC2) Architecture Specification Version 1.0 from the OASIS Open Command…
STIX2.1 Best Practices
Earlier today members of the CTI TC received notification that the Best Practices document developed in support of the STIX2.1…