Energy Sector Standard: Public Review
Common Transactive Services (CTS) permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any…
A catch-all for topics related to cybersecurity.
Common Transactive Services (CTS) permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any…
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and…
The U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) announcement of a pilot program to deliver cybersecurity shared services to critical…
CTIN has discovered a new campaign that appears to be associated with previous malicious infrastructure attributed to Evilnum. EvilNum is…
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground,…
Setting up an Information Sharing and Analysis Center (ISAC) is essential for organizations aiming to create a comprehensive and strategic…
What wisdom can you find that is greater than kindness? - Jean-Jacques Rousseau (1712-1778)
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it…
Threat hunting with TheHive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture.…
By: Niels Groeneveld, OSINT AnalystJanuary 29, 2023 Human trafficking is a complex and pervasive problem that requires a multi-disciplinary approach…