22 08, 2018

How the Software Bill of Materials will Advance Secure Software Development.

By |2019-10-31T10:59:19-07:00August 22nd, 2018|Categories: Secure Software Development|Tags: , , , , |

Allan Friedman’s vision of the SBOM is Kubrickian indeed. Stanley Kubrick made films that looked with deep introspection into the future of our society, often as a polite and sometimes troubling warning of things to come. Like Kubrick, the cybersecurity expert Allan Friedman is calling attention to how [...]

1 12, 2017

Enigma Interviews 2: Autonomous Vehicles and Security

By |2018-08-21T09:03:20-07:00December 1st, 2017|Categories: Events|Tags: , , , |

On November 29, we hosted the second installment of Enigma Interviews, presented by USINEX. Seth Rosenblatt of The Parallax, moderated the evening’s discussion on autonomous vehicles and security featuring speakers Deirdre Mulligan of UC Berkeley and Stefan Savage of UC San Diego. “There’s a real difference when we compare [...]

6 10, 2017

Webinar: How to Create and Maintain a DevSecOps Culture

By |2019-10-22T13:57:29-07:00October 6th, 2017|Categories: Events, Webinar|Tags: , , , , , |

The use of open source, speed of continuous integration and delivery, containerization and the move to the cloud all mean that a new approach to application security is needed. One solution is DevSecOps, where the feedback loops between DevOps and security are closed, teams are integrated and code [...]

17 05, 2017

Syniverse and New Context Partner to Solve Industrial Internet Security Challenges

By |2017-06-20T21:03:57-07:00May 17th, 2017|Categories: News & Press Releases|Tags: , , , , , , |

TAMPA, Fla. – May 16, 2017 – Syniverse and New Context today announced a technology partnership that will enable the companies to address the most challenging industrial internet security challenges faced by the world’s largest automotive, energy and manufacturing companies. “Persistent cyber-attacks are ever-present and growing challenges that vary widely [...]

29 03, 2017

New Context works to mature STIX

By |2018-01-19T19:01:54-08:00March 29th, 2017|Categories: Articles|Tags: , , , , , , , , |

In January of 2015, New Context was commissioned by a client to perform a review of existing machine readable threat feed frameworks. The customer, a user of Industrial Control System (ICS) hardware, is looking years into the future in hopes to forge a path in which complex patterns of [...]

28 02, 2017

RSA 2017: My DevOps Panel Takeaways

By |2017-02-28T22:26:15-08:00February 28th, 2017|Categories: Events|Tags: , , , , , , |

Last week, nearly 43,000 of my closest security friends and I gathered at the RSA Conference at San Francisco’s Moscone Center. Per usual, the event didn’t disappoint. As a member of the DevSecOps speaking panel, here are a few of my key RSA takeaways from that discussion for organizations implementing [...]

22 11, 2016

Why Every Business Should Embrace Automated Threat Response

By |2018-01-19T21:03:44-08:00November 22nd, 2016|Categories: Articles|Tags: , , , , |

Image via Pixabay When it comes to information sharing in the workplace, it’s truly astounding to see how far the industrial world has come in recent years. Today, virtually every department in a company can access, analyze, and share information like never before — which is unlocking huge [...]

4 10, 2016

New Context Appoints Azadeh Ghiasvand Vice President, Engineering

By |2016-10-24T19:43:23-07:00October 4th, 2016|Categories: News & Press Releases|Tags: , , , , |

SAN FRANCISCO – October 4, 2016 - New Context, the leading provider of Lean Security for software and infrastructure development, today announced that the company has appointed Azadeh Ghiasvand, a 25-year veteran of Silicon Valley, as vice president of engineering. “As the newest addition to our team, Azadeh will leverage [...]

20 09, 2016

A Glimmer of Hope for Cyberthreat Data Sharing

By |2019-11-18T09:12:34-08:00September 20th, 2016|Categories: Articles|Tags: , , , , , , , , |

New Context’s partner, Soltra, was recently featured in an article on the value of cyber threat data sharing. “A new wrinkle offers hope. U.S. Bank and other institutions have begun using technology known as Soltra to generate machine-readable cyberthreat alerts that can automatically trigger actions in security software. This should [...]

Load More Posts