5 11, 2020

What is Cyber Threat Intelligence?

By |2020-11-05T12:41:06-08:00November 5th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI)|

Fortunately, most people are not proponents or fans of armed conflict, especially on the nation-state level where the resulting destruction can be unimaginable. Yet, the wise among us realize that not being prepared to defend yourself, if necessary, can render you vulnerable to those with bad intentions. However, successfully battling [...]

15 10, 2020

Cloud Security Vulnerabilities: A Step-by-Step Plan for Quelling Threats

By |2020-10-15T12:28:05-07:00October 15th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

When referring to the global network of computing resources that house and drive data and information interchanges today, many use the term “cloud” or “cloud computing.” From a holistic vantage point, this nomenclature has merit similar to that of the expression network used when describing a LAN, WAN, or MAN. [...]

6 10, 2020

Data Security for Banks: Standards for Success

By |2020-10-06T11:25:28-07:00October 6th, 2020|Categories: Blog, Cyber Threat Intelligence (CTI), Secure Compliant Data Platform|

Data breaches are perhaps the single most significant risk that banks face today. In the financial industry, the cost per data breach averaged about $5.85 million in 2020. Aside from the direct costs involved in these breaches, like lost funds, increased insurance expenses and fines, and penalties, institutions also must [...]

26 09, 2019

New Context and Idaho National Laboratory to Develop Operational Cybersecurity Technology

By |2019-10-31T09:43:40-07:00September 26th, 2019|Categories: Cyber Threat Intelligence (CTI), News & Press Releases|

New Context collaborates with U.S. Department of Energy and Idaho National Laboratory to help protect U.S. critical infrastructure from cyber threats.   SAN FRANCISCO--(BUSINESS WIRE)--September 26, 2019-- New Context, a leading innovator in cybersecurity research for highly regulated industries, today announced its ongoing collaboration with the U.S. Department of Energy [...]

2 09, 2019

Using Security Orchestration in Utility Networks

By |2019-10-31T15:21:09-07:00September 2nd, 2019|Categories: Critical Infrastructure, Cyber Threat Intelligence (CTI)|Tags: , , , , |

Since 2015, New Context has been working with partner utilities and national labs to research methods to create and share cybersecurity threat intelligence. One primary goal we have strived to understand is how to ultimately provide a roadmap for automated cyber threat detection and response for utility systems. [...]

3 04, 2019

Using STIX Patterns to Search Binary Data in ELK

By |2019-10-31T15:34:40-07:00April 3rd, 2019|Categories: Cyber Threat Intelligence (CTI)|Tags: , , , |

In the area of cyber threat intelligence, indicators based on deep understanding of compiled executables usually take a back seat to data artifacts such as log messages, configurations, file hashes, or network flow data. Binary patterns can be an incredibly useful tool to identify threats in executables and other [...]

11 02, 2019

Cybersecurity in the Age of Digital Transformation

By |2020-07-22T10:14:51-07:00February 11th, 2019|Categories: Critical Infrastructure, Cyber Threat Intelligence (CTI)|Tags: , |

2018 has been a significant year for AI/Machine Learning, and we can clearly see a race for AI dominance in the global market. AI Market growing to $89 Billion by 2023 This race for AI superiority is creating a gold rush to collect data at a scale [...]

24 08, 2018

The United States electrical critical infrastructure is under attack. Here’s how we fight back.

By |2019-10-31T15:45:12-07:00August 24th, 2018|Categories: Critical Infrastructure, Cyber Threat Intelligence (CTI)|Tags: , , , |

Sharing threat data and standards in cyber threat intelligence will take center stage at EnergySec 2018. Bad actors continue to attack corporate networks to damage systems, data and corporate brands, the next wave of attacks are to industrial control systems (ICS) within the U.S. electrical grid. Our engineers [...]

17 08, 2018

Securing ICS and OT:  The Active Cyber Interview with New Context CEO Daniel Riedel

By |2019-10-31T15:47:53-07:00August 17th, 2018|Categories: Cyber Threat Intelligence (CTI)|Tags: , , , , |

Daniel Riedel sat down with Active Cyber to chat about securing industrial control systems (ICS) and IoT, and the challenges posed by synthetic identities. Editor Chris Daly and Daniel explore the origins of New Context and our mission to keep the connected world safe, and move quickly into [...]

Go to Top