Expanding the Use Cases for STIX in Law Enforcement
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
A catch-all for topics related to cybersecurity.
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the…
Common Transactive Services permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any market.
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber…
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military…
With the right foundation and ongoing engagement, an ISAC can significantly enhance an organization's resilience to cybersecurity threats.
Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for…
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a…
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This…