CYBERSECURITY RESEARCH
Advancing cybersecurity with strategic partnerships
Fundamental understanding of Industrial Controls, Internet of Things, Embedded Systems, and sensor technologies, and the associated security and operational requirements they present.
- Automated Threat Detection and Response for Control Systems
- Cybersecurity Standards Development
- Predictive Threat Modeling of GIS Data
- Supply Chain Trust
- Critical Infrastructure Resiliency
Recent Projects
CYBERSECURITY STANDARDS
Experts in STIX, TAXII, OpenC2 and others
Structured Threat Information Expression (STIX™)
- New Context is one of the foremost authorities on the STIX standard.
- Our research team has developed STIX extensions for utility protocols such as Modbus/TCP, DNP3, and IEEE 16805/GOOSE.
- We are the co-authors of the STIX patterning language.
Trusted Automated Exchange of Intelligence Information (TAXII™)
- New Context is an authority on STIX and TAXII.
- We have supported TAXII since its charter within OASIS in 2015.
- Many of our research projects include the use of threat intelligence platforms with TAXII cyber threat intelligence feeds.
Open Command and Control (OpenC2)
OpenC2 is a standardized language for the command and control of technologies that provide or support cyber defenses. By providing a common language for machine-to-machine communication, OpenC2 is vendor and application agnostic, enabling interoperability across a range of cyber security tools and applications.
Collaborative Automated Course of Action Operations (CACAO) for Cyber Security
CACAO TC members are developing a standard to implement the course of action playbook model for cybersecurity operations. In order to defend against cyber threats, organizations must manually identify, create, and document the prevention, mitigation, and remediation steps that, together, form a course of action playbook.
OCA is building an open ecosystem where cybersecurity products interoperate without the need for customized integrations. Using community-developed standards and practices, we’re simplifying integration across the threat lifecycle.

One of the most respected, non-profit standards bodies in the world, OASIS Open offers projects—including open source projects—a path to standardization and de jure approval for reference in international policy and procurement.
CONSULTING AND MANAGEMENT EXPERTISE
Facilitators Across Organizations
Beyond the Technical
Creative Problem Solvers
Many Talented Experts
Executive Level Delivery
From Our Blog
Using STIX Patterns to Search Binary Data in ELK
In the area of cyber threat intelligence, indicators based [...]
Cybersecurity in the Age of Digital Transformation
2018 has been a significant year for AI/Machine [...]
The United States electrical critical infrastructure is under attack. Here’s how we fight back.
Sharing threat data and standards in cyber threat [...]
Securing ICS and OT: The Active Cyber Interview with New Context CEO Daniel Riedel
Daniel Riedel sat down with Active Cyber to [...]