29 07, 2019

National Lab Day on the Hill

By |2019-10-31T15:23:07-07:00July 29th, 2019|Categories: Critical Infrastructure, Events|Tags: , , |

Photo from Senator Jim Risch's @SenatorRisch twitter.   On July 24, New Context was honored to join Idaho National Laboratory in Washington, DC for “National Lab Day on the Hill.” The annual event focused on the grid of the future with exhibitions from all 17 National Labs. The [...]

3 04, 2019

Using STIX Patterns to Search Binary Data in ELK

By |2019-10-31T15:34:40-07:00April 3rd, 2019|Categories: Cyber Threat Intelligence (CTI)|Tags: , , , |

In the area of cyber threat intelligence, indicators based on deep understanding of compiled executables usually take a back seat to data artifacts such as log messages, configurations, file hashes, or network flow data. Binary patterns can be an incredibly useful tool to identify threats in executables and other [...]

28 11, 2018

3 Key InfoSec things to do before the end of the year

By |2019-10-31T10:58:20-07:00November 28th, 2018|Categories: Secure Software Development, Tips & Tricks|Tags: , , , , , |

Thanksgiving in the US is passed and year end is in sight. As the end of the calendar year draws near, let's consider a few short term objectives you can complete right now that will have a long lasting effect on your security programs in 2019. 1. [...]

26 02, 2018

Big Congrats to Trey Darley – He’s on the OASIS International Standards Body Technical Advisory Board

By |2019-10-22T10:17:19-07:00February 26th, 2018|Categories: News & Press Releases|Tags: , , , , , |

I’m pleased to announce that my colleague, Trey Darley has been appointed to the Technical Advisory Board (TAB) for the international standards group, OASIS. Trey is the Director of Standards Development here at New Context, and his standards expertise has been super-influential to the work we’ve been doing [...]

29 09, 2017

STIX Patterning quick reference card

By |2019-10-22T14:07:12-07:00September 29th, 2017|Categories: Tips & Tricks|Tags: , , , , |

Indicators are probably the most frequently used object in the STIX 2 data model. At the heart of STIX Indicators is the STIX Patterning Language. STIX Patterning is a powerful tool capable of describing a wide spectrum of malicious attacker behavior in a machine-parsable format suitable for security automation. STIX [...]

19 07, 2017

New Context’s Key Takeaways From Borderless Cyber USA 2017

By |2019-11-18T09:08:46-08:00July 19th, 2017|Categories: Events|Tags: , , , , , , , , , , , , , , |

New Context participated in Borderless Cyber USA, June 21-22, 2017, in New York, where we heard from industry experts about the importance of changing the economics of cyber defense. Daniel Riedel, CEO, New Context, shares one of the key takeaways from the event. Three [...]

10 07, 2017

Open Standards and the Future of Network Defense

By |2019-11-18T09:09:20-08:00July 10th, 2017|Categories: Articles|Tags: , , , , , , , , , , |

Our vulnerable attack surface is increasing, as are the adversaries targeting our systems and networks - both in terms of quantity and sophistication. Our ability to safeguard ourselves is fundamentally incapable of scaling in parallel with the threats confronting us. The inadequacy of old-school perimeter-based network defense was proven long [...]

Go to Top