Charting a New Course for Military Cyber Threat Intelligence
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military…
Information on STIX & TAXII standards.
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military…
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a…
STIX and TAXII are both open-source frameworks that enable the exchange of cyber threat intelligence in a structured and machine-readable format.
The STIX Best Practices guide suggests best practices to use for STIX content, considering both the normative statements as well as considerations…
The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and…
This video provides an overview of how STIX2.1, OpenC2 and CACAO work together to tackle high profile hacks.
After 6 years and multiple versions and Ballots the final stable STIX2.1 has been released. It will now be eligible for consideration…
The STIX 2 Pattern Validator is a software tool for checking the syntax of the Cyber Threat Intelligence (CTI) STIX Pattern expressions,…
We are pleased to announce that STIX™ Version 2.1 and TAXII™ Version 2.1 from the OASIS Cyber Threat Intelligence (CTI) TC are…
A STIX/TAXII community member, Stephen Russett, recently contributed a new open source tool to the CTI community. Here is what he provided…