Blog

Security Best Practices for Commercial Facilities


Property managers of commercial facilities like shopping centers, sports stadiums, casinos, churches, and movie complexes face unique physical security and cybersecurity challenges. These places often have numerous points of access to the facility and the internet and digital systems, including Wi-Fi networks for visitors, point-of-sale systems for merchants, digital signage, security systems, and …

Why Use STIX2.1 In Your Products


Cyber security and online data protection with tacit secured encryption software . Concept of smart digital transformation and technology disruption that changes global trends in new information era .

The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a common language and framework for representing and exchanging cyber threat information. This can help to improve the efficiency and effectiveness of cyber threat intelligence sharing and collaboration.

The STIX2.1 data model is …

Threat Hunting with TheHive, Cortex and MISP


Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This comprehensive approach requires a structured and systematic process that includes several key steps.

Leveraging STIX and TAXII for Human Trafficking Intelligence: A Technical Analysis


By: Niels Groeneveld, OSINT AnalystJanuary 29, 2023

Human trafficking is a complex and pervasive problem that requires a multi-disciplinary approach to combat. One important aspect of this effort is the collection and sharing of intelligence, which can help identify and disrupt trafficking networks. The Structured Threat Information Expression (STIX) and Trusted Automated eXchange of …

Expanding the Use Cases for STIX and TAXII in Law Enforcement Threat Intelligence Sharing


Rackmount LED console in server room data center - 3d illustration

STIX and TAXII are widely recognized as key frameworks for the sharing and exchange of cyber threat intelligence between organizations. However, the potential uses for these frameworks extend far beyond just the realm of cyber threats. In fact, they can play a crucial role in facilitating the sharing of threat intelligence between law …

Expanding the Use Cases of STIX and TAXII: Leveraging Threat Intelligence Frameworks for National Security and Intelligence Analysis


As the world becomes increasingly interconnected and dependent on technology, the need for robust cyber threat intelligence (CTI) sharing has become paramount. The STIX and TAXII frameworks, developed by the OASIS CTI Technical Committee, have been widely adopted as a standard for sharing CTI among organizations and agencies. However, the use cases for …

Common Security Advisory Framework (CASF) 2.0 Finalized


Boston, MA, USA, 21 November, 2022 – OASIS Open, the international open source and standards consortium, announced the approval of the Common Security Advisory Framework (CSAF) 2.0 as a full OASIS standard, a status that signifies the highest level of ratification. This new version of CSAF includes support for the Vulnerability Exploitability Exchange …

OASIS Advisor Elected to UN Economic Commission for Europe Specialist Team


Geneva, Switzerland - December 03, 2019: Palace of Nations and Country flags - United Nations Office - Geneva, Switzerland

Congratulations to Harm Jan van Burg, Senior Policy Advisor, International Standards at OASIS Open, on his election as Vice Chair of the United Nations Economic Commission for Europe (UNECE)’s Team of Specialists on Environmental, Social and Governance (ESG) Traceability of Sustainable Value Chains in the Circular Economy. 

The Team of Specialists supports ESG traceability …

OpenC2 Architecture Specification


Cyber security and online data protection with tacit secured encryption software . Concept of smart digital transformation and technology disruption that changes global trends in new information era .

OASIS is pleased to announce that Open Command and Control (OpenC2) Architecture Specification Version 1.0 from the OASIS Open Command and Control (OpenC2) TC has been approved as an OASIS Committee Specification.

Cyberattacks are increasingly sophisticated, less expensive to execute, dynamic and automated. The provision of cyber defense via statically configured products operating …

STIX2.1 Best Practices


Computer on desktop in office with technology theme hologram. Multi exposure. Tech concept.

Earlier today members of the CTI TC received notification that the Best Practices document developed in support of the STIX2.1 OASIS Standard had been finalized. Below is the announcement and links to the final document.

OASIS is pleased to announce publication of “STIX™ Best Practices Guide Version 1.0.0”, a Committee Note from …

Exit mobile version