3 04, 2019

Using STIX Patterns to Search Binary Data in ELK

By |2019-10-31T15:34:40-07:00April 3rd, 2019|Categories: Cyber Threat Intelligence (CTI)|Tags: , , , |

In the area of cyber threat intelligence, indicators based on deep understanding of compiled executables usually take a back seat to data artifacts such as log messages, configurations, file hashes, or network flow data. Binary patterns can be an incredibly useful tool to identify threats in executables and other [...]

26 02, 2018

Big Congrats to Trey Darley – He’s on the OASIS International Standards Body Technical Advisory Board

By |2019-10-22T10:17:19-07:00February 26th, 2018|Categories: News & Press Releases|Tags: , , , , , |

I’m pleased to announce that my colleague, Trey Darley has been appointed to the Technical Advisory Board (TAB) for the international standards group, OASIS. Trey is the Director of Standards Development here at New Context, and his standards expertise has been super-influential to the work we’ve been doing [...]

28 11, 2017

New Context to Present on STIX Patterning at Borderless Cyber in Prague

By |2018-08-21T09:03:35-07:00November 28th, 2017|Categories: Events|Tags: , , , , , , , |

STIX Patterning is perhaps the most innovative addition to STIX 2.0, yet it is poorly understood. STIX Patterning is the language in which IOCs are conveyed in STIX 2.0 Indicators. But STIX Patterning targets much more than IOCs. Join Us Join us for the Cyber Threat Intelligence Matters Borderless [...]

29 09, 2017

STIX Patterning quick reference card

By |2019-10-22T14:07:12-07:00September 29th, 2017|Categories: Tips & Tricks|Tags: , , , , |

Indicators are probably the most frequently used object in the STIX 2 data model. At the heart of STIX Indicators is the STIX Patterning Language. STIX Patterning is a powerful tool capable of describing a wide spectrum of malicious attacker behavior in a machine-parsable format suitable for security automation. STIX [...]

19 07, 2017

New Context’s Key Takeaways From Borderless Cyber USA 2017

By |2019-11-18T09:08:46-08:00July 19th, 2017|Categories: Events|Tags: , , , , , , , , , , , , , , |

New Context participated in Borderless Cyber USA, June 21-22, 2017, in New York, where we heard from industry experts about the importance of changing the economics of cyber defense. Daniel Riedel, CEO, New Context, shares one of the key takeaways from the event. Three [...]

30 05, 2017

Cyber Threat Intelligence: Borderless Cyber and Beyond

By |2019-11-18T09:11:01-08:00May 30th, 2017|Categories: Articles, Events|Tags: , , , , , , |

At New Context, we have long been committed to cyber threat intelligence (CTI), particularly as it relates to defining, sharing and automating information about threats. It should come as no surprise, then, that in June we will be on-site in New York City as sponsors of OASIS’ Borderless Cyber Conference. [...]

29 03, 2017

New Context works to mature STIX

By |2018-01-19T19:01:54-08:00March 29th, 2017|Categories: Articles|Tags: , , , , , , , , |

In January of 2015, New Context was commissioned by a client to perform a review of existing machine readable threat feed frameworks. The customer, a user of Industrial Control System (ICS) hardware, is looking years into the future in hopes to forge a path in which complex patterns of [...]

10 03, 2017

Patterning in STIX 2.0 Upcoming Talk at ICSJWG

By |2018-01-19T21:01:01-08:00March 10th, 2017|Categories: Events|Tags: , , , , |

Thursday, April 13, 2017, 1:45pm Patterning in STIX 2.0 John-Mark Gurney, Principal Security Architect for New Context will be speaking at Industrial Control Systems Joint Working Group (ICSJWG) Spring Meeting Abstract Cyber Threat Intelligence (CTI) is only useful if it provides actionable intelligence which improves an organization's security. Structured Threat Information Expression (STIX) [...]

14 02, 2017

RSA 2017 Features Huge Demonstration of Support for Cyber Threat Intelligence

By |2017-02-28T18:22:52-08:00February 14th, 2017|Categories: News & Press Releases|Tags: , , , |

RSA 2017 Features Huge Demonstration of Support for Cyber Threat Intelligence, Encryption, and Cryptography Standards as 24 OASIS Member Companies Collaborate Bay Dynamics, DFLabs, EclecticIQ, Fujitsu, IBM, LookingGlass, New Context, NC4, ThreatConnect, ThreatQuotient, TruSTAR, and Verisign Demo STIX and TAXII Support. Cryptsoft, Feitan, Fornetix, Hancom Secure, Hewlett Packard Enterprise (HPE), [...]

Load More Posts
Go to Top