A Pilot Program for Critical Infrastructure
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
A catch-all for topics related to cybersecurity.
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber…
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military…
With the right foundation and ongoing engagement, an ISAC can significantly enhance an organization's resilience to cybersecurity threats.
Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for…
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a…
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This…
STIX and TAXII are both open-source frameworks that enable the exchange of cyber threat intelligence in a structured and machine-readable format.
One key area where STIX and TAXII can be leveraged is in the realm of national security and intelligence analysis.
OASIS Open, the international open source and standards consortium, announced the approval of the Common Security Advisory Framework (CSAF) 2.0 as a…