17 08, 2018

Securing ICS and OT:  The Active Cyber Interview with New Context CEO Daniel Riedel

By |2019-10-31T15:47:53-07:00August 17th, 2018|Categories: Cyber Threat Intelligence (CTI)|Tags: , , , , |

Daniel Riedel sat down with Active Cyber to chat about securing industrial control systems (ICS) and IoT, and the challenges posed by synthetic identities. Editor Chris Daly and Daniel explore the origins of New Context and our mission to keep the connected world safe, and move quickly into [...]

2 05, 2018

Synthetic identities are growing in power and influence, and the risk to the industrial internet is growing with them.

By |2019-10-22T14:08:45-07:00May 2nd, 2018|Categories: Articles|Tags: , , , |

The solution lies in attribution - critical infrastructure that audits all actors and their actions within a given environment. The recent launch of the SpaceX Falcon Heavy almost broke the internet, but is anyone talking about the online response to Elon Musk’s tweet of the event? That tweetstorm [...]

8 11, 2017

New Context CEO Daniel Riedel to Present at Blockchain WithTheBest

By |2018-08-21T09:04:46-07:00November 8th, 2017|Categories: Events|Tags: , , , , , |

Daniel Riedel, CEO, New Context, has been selected to present at Blockchain WithTheBest Virtual Conference, November 15-16. The world’s largest online summit dedicated to blockchain will provide two tracks: General and Dev, with 50 sessions across the two-day event which can be attended live or via recordings. Sessions will [...]

30 10, 2017

New Context CEO Daniel Riedel Testifies Before Senate Committee

By |2019-11-18T09:04:21-08:00October 30th, 2017|Categories: Articles, Events|Tags: , , , , |

Last Thursday, October 26, our CEO, Daniel Riedel, had the honor of testifying before the Senate Committee on Energy & Natural Resources during a hearing to examine cyber technologies that can be used to help protect electric grids and energy infrastructure from cyber attacks. “New Context is currently working [...]

17 10, 2016

Three Threat Intel Learnings You Need to Know

By |2016-11-07T16:28:07-08:00October 17th, 2016|Categories: Articles|Tags: , , , , |

Image via Pixabay.com Borderless Cyber Europe: Three Threat Intel Learnings You Need to Know   As a panelist at last month’s Borderless Cyber Europe Conference in the European Commission in Brussels, Daniel Riedel was encouraged by the wide variety of parties in the room: financial companies, government agencies [...]

23 09, 2016

Past Event: Borderless Cyber Europe

By |2016-10-24T19:43:23-07:00September 23rd, 2016|Categories: Events|Tags: , , , , , , , , |

On September 8-9, 2016, New Context sponsored Borderless Cyber Europe. Daniel Riedel participated in a panel discussion on the key components of a successful cyber threat intelligence sharing program. The panel discussed the requirements for organizations to support the machine readable threat intelligence standard frameworks of STIX, CybOX and TAXII. [...]

3 08, 2016

Why a global threat sharing program is vital to protect global infrastructure

By |2019-10-22T14:14:05-07:00August 3rd, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , , |

Image via Pixabay.com We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and the public and private sectors have been working tirelessly to create these programs. So far, the biggest challenges have revolved around [...]

26 07, 2016

New Context Appoints Noted Chief Architect Herb Kelsey as Chief Technology Officer

By |2016-10-24T19:43:24-07:00July 26th, 2016|Categories: News & Press Releases|Tags: , , , |

SAN FRANCISCO--(BUSINESS WIRE)--New Context, the leading provider of Lean Security for software and infrastructure development, today announced that the company has appointed Herb Kelsey as chief technology officer, where he will help New Context and its clients build, scale and architect the most advanced data solutions for critical infrastructure. “New [...]

24 06, 2016

Secure Your Startup Against Phishers With These 3 Tips

By |2019-11-18T09:13:58-08:00June 24th, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , |

Phishers -- unscrupulous Internet lurkers who try to get your username, password, credit card number and other sensitive information by posing as trusted sources -- know there’s a big pool of money out there. And, more often than not, to get it, all they need to do is cast a [...]

Load More Posts
Go to Top