2 09, 2019

Using Security Orchestration in Utility Networks

By |2019-10-31T15:21:09-07:00September 2nd, 2019|Categories: Critical Infrastructure, Cyber Threat Intelligence (CTI)|Tags: , , , , |

Since 2015, New Context has been working with partner utilities and national labs to research methods to create and share cybersecurity threat intelligence. One primary goal we have strived to understand is how to ultimately provide a roadmap for automated cyber threat detection and response for utility systems. [...]

10 07, 2017

Open Standards and the Future of Network Defense

By |2019-11-18T09:09:20-08:00July 10th, 2017|Categories: Articles|Tags: , , , , , , , , , , |

Our vulnerable attack surface is increasing, as are the adversaries targeting our systems and networks - both in terms of quantity and sophistication. Our ability to safeguard ourselves is fundamentally incapable of scaling in parallel with the threats confronting us. The inadequacy of old-school perimeter-based network defense was proven long [...]

Go to Top