Cybersecurity Research Services2021-01-12T10:09:25-08:00

CYBERSECURITY RESEARCH

Advancing cybersecurity with strategic partnerships

CONTACT US FOR A BRIEFING

Fundamental understanding of Industrial Controls, Internet of Things, Embedded Systems, and sensor technologies, and the associated security and operational requirements they present.

  • Automated Threat Detection and Response for Control Systems
  • Cybersecurity Standards Development
  • Predictive Threat Modeling of GIS Data
  • Supply Chain Trust
  • Critical Infrastructure Resiliency

Recent Projects

CYBERSECURITY STANDARDS

Experts in STIX, TAXII, OpenC2 and others

CONTACT US FOR A BRIEFING
LOGO STIX

Structured Threat Information Expression (STIX™)

  • New Context is one of the foremost authorities on the STIX standard.
  • Our research team has developed STIX extensions for utility protocols such as Modbus/TCP, DNP3, and IEEE 16805/GOOSE.
  • We are the co-authors of the STIX patterning language.
TAXII Logo

Trusted Automated Exchange of Intelligence Information (TAXII™)

  • New Context is an authority on STIX and TAXII.
  • We have supported TAXII since its charter within OASIS in 2015.
  • Many of our research projects include the use of threat intelligence platforms with TAXII cyber threat intelligence feeds.
open-c2 Logo

Open Command and Control (OpenC2)

OpenC2 is a standardized language for the command and control of technologies that provide or support cyber defenses. By providing a common language for machine-to-machine communication, OpenC2 is vendor and application agnostic, enabling interoperability across a range of cyber security tools and applications.

CACAO Logo

Collaborative Automated Course of Action Operations (CACAO) for Cyber Security

CACAO TC members are developing a standard to implement the course of action playbook model for cybersecurity operations. In order to defend against cyber threats, organizations must manually identify, create, and document the prevention, mitigation, and remediation steps that, together, form a course of action playbook.

OCA Logo

OCA is building an open ecosystem where cybersecurity products interoperate without the need for customized integrations. Using community-developed standards and practices, we’re simplifying integration across the threat lifecycle.

OASIS Logo

One of the most respected, non-profit standards bodies in the world, OASIS Open offers projects—including open source projects—a path to standardization and de jure approval for reference in international policy and procurement.

CONSULTING AND MANAGEMENT EXPERTISE

CONTACT US FOR A BRIEFING

Facilitators Across Organizations

Facilitators across organizations of all sizes and industries all sizes and industries

Beyond the Technical

Beyond the technical; we are experts in the reporting and compliance needs of our customers regardless of size and complexity.

Creative Problem Solvers

Creative problem solvers who deliver fast results via a collaborative process with our customers.

Many Talented Experts

Many talented experts in engineering, systems management, control systems, security and compliance.

Executive Level Delivery

Executive level delivery; presentation delivery, webcast demonstrations and sophisticated reporting materials for our clients to illustrate project outcomes.

From Our Blog

Go to Top