Energy Sector Standard: Public Review
Common Transactive Services permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any market.
Common Transactive Services permits energy consumers and producers to interact through energy markets by simplifying actor interaction with any market.
OASIS-Open’s Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability ‘Plugfest’ in the Washington, D.C. area on April 11th and 12th.
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools, networks and end points are highly specialized.
A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.
This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber threat analysts provide.
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.
In a striking revelation that underscores the escalating tensions between Russia and Ukraine, a coalition of Western intelligence agencies has brought to light a concerning cyber threat.
Commercial facilities require special considerations for designing physical security operations.
With the right foundation and ongoing engagement, an ISAC can significantly enhance an organization’s resilience to cybersecurity threats.
Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for freedom.
“What wisdom can you find that is greater than kindness?”
– Jean-Jacques Rousseau (1712-1778)
No single solution can provide complete protection against all cybersecurity threats. The most effective strategy involves a layered approach, combining several measures to protect different parts of the network and system.
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a common language and framework for representing and exchanging cyber threat information.
Threat hunting with The Hive, Cortex, and MISP is a critical practice for any organization looking to enhance its cybersecurity posture. This comprehensive approach requires a structured and systematic process that includes several key steps.
STIX and TAXII are both open-source frameworks that enable the exchange of cyber threat intelligence in a structured and machine-readable format.
One of the main benefits of using STIX and TAXII for law enforcement threat intelligence sharing is the ability to standardize the format and structure of the intelligence being shared.
One key area where STIX and TAXII can be leveraged is in the realm of national security and intelligence analysis.
OASIS Open, the international open source and standards consortium, announced the approval of the Common Security Advisory Framework (CSAF) 2.0 as a full OASIS standard.
Informed decisions for sustainable production and consumption can lead to increased cooperation between countries and more successful climate change policies and actions.