A New Age of Data Rights Enforcement
By: Douglas DePeppe, Esq., Co-Founder – Sports-ISAO Sports-ISAO has been engaged in cyber attacker hunting (and social media abuser hunting) for many years. Over this time, a change in attack…
A catch-all for topics related to cybersecurity.
By: Douglas DePeppe, Esq., Co-Founder – Sports-ISAO Sports-ISAO has been engaged in cyber attacker hunting (and social media abuser hunting) for many years. Over this time, a change in attack…
https://youtu.be/sMFQzcG6AqQ
After 6 years and multiple versions and Ballots the final stable STIX2.1 has been released. It will now be eligible for consideration as a standard under the auspices of the…
Another tool for developers building STIX 2.1 products.
https://vimeo.com/490962757 Acceptance Speech
We are pleased to announce that STIX™ Version 2.1 and TAXII™ Version 2.1 from the OASIS Cyber Threat Intelligence (CTI) TC are now available for public review and comment. Structured…
The Annual Report issued by the European Union’s (EU) Network and Information Security Agency (ENISA) has recently been released for patterns observed in 2018. The scope of the report included…
A STIX/TAXII community member, Stephen Russett, recently contributed a new open source tool to the CTI community. Here is what he provided as guidance. “The TAXII-Worker is a “External Task…
OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence…
The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare…