Why Use STIX2.1 In Your Products
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a…
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a…
One key area where STIX and TAXII can be leveraged is in the realm of national security and intelligence analysis.
The STIX 2 Pattern Validator is a software tool for checking the syntax of the Cyber Threat Intelligence (CTI) STIX Pattern expressions,…
We are pleased to announce that STIX™ Version 2.1 and TAXII™ Version 2.1 from the OASIS Cyber Threat Intelligence (CTI) TC are…
In a recent article published on Tripwire by CTIN co-founder Jane Ginn compared the original battle of Marathon in Greece with the…
CTIN and partner EclecticIQ have joined together to provide training programs for threat intelligence hunting. The shortage of trained threat intelligence hunters…
This essay presents a short history on the development of information sharing frameworks, one feature of the recent Executive Order on cybersecurity…