27 11, 2016

New Context Predicts Strong Future for STIX, TAXII Open Standards for Cyber Threat Intelligence (CTI)

By |2018-01-19T21:01:44-08:00November 27th, 2016|Categories: News & Press Releases|Tags: , , , , , |

New Context, the leading provider of Lean Security for software and infrastructure development and sponsor of the OASIS Cyber Threat Intelligence (CTI) Technical Committee, today shared a strong, positive outlook for CTI open standards STIX and TAXII amid news that Soltra is being phased out. Despite a short term impact [...]

22 11, 2016

Why Every Business Should Embrace Automated Threat Response

By |2018-01-19T21:03:44-08:00November 22nd, 2016|Categories: Articles|Tags: , , , , |

Image via Pixabay When it comes to information sharing in the workplace, it’s truly astounding to see how far the industrial world has come in recent years. Today, virtually every department in a company can access, analyze, and share information like never before — which is unlocking huge [...]

25 10, 2016

Security for Startups in a DevOps World Webinar Follow-up

By |2019-09-12T10:48:27-07:00October 25th, 2016|Categories: Articles, Webinar|Tags: , , , , , |

On October 18, Ben Tomhave, Security Architect for New Context talked about using Lean Security practices to integrate automated security into your DevOps processes and how to embed security practices into your company’s core culture. Didn’t have time to join us for our webinar? No worries! We know you’re busy! We [...]

19 10, 2016

Change the Incentive Model, Change the Culture

By |2019-11-18T09:12:25-08:00October 19th, 2016|Categories: Articles, DevSecOps, Tips & Tricks|Tags: , , |

It's imperative that all security conversations start not with technical issues, but instead with an understanding of the context for those issues, and the incentive models and org culture against which they're (mis)aligned. This is why our Lean Security model is about business transformation rather than being yet another IT [...]

18 10, 2016

How To Talk About Security With Every C-Suite Member

By |2016-10-31T22:14:22-07:00October 18th, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , |

Image via Pixabay.com Communicating with C-Suite leaders about the ongoing security threats your company faces can easily turn into an exercise in futility. Their eyes glaze over as you present metrics and charts that illustrate the current state of the business’s IT infrastructure, and your attempts to justify [...]

4 10, 2016

New Context Appoints Azadeh Ghiasvand Vice President, Engineering

By |2016-10-24T19:43:23-07:00October 4th, 2016|Categories: News & Press Releases|Tags: , , , , |

SAN FRANCISCO – October 4, 2016 - New Context, the leading provider of Lean Security for software and infrastructure development, today announced that the company has appointed Azadeh Ghiasvand, a 25-year veteran of Silicon Valley, as vice president of engineering. “As the newest addition to our team, Azadeh will leverage [...]

23 09, 2016

Past Event: Borderless Cyber Europe

By |2016-10-24T19:43:23-07:00September 23rd, 2016|Categories: Events|Tags: , , , , , , , , |

On September 8-9, 2016, New Context sponsored Borderless Cyber Europe. Daniel Riedel participated in a panel discussion on the key components of a successful cyber threat intelligence sharing program. The panel discussed the requirements for organizations to support the machine readable threat intelligence standard frameworks of STIX, CybOX and TAXII. [...]

20 09, 2016

A Glimmer of Hope for Cyberthreat Data Sharing

By |2019-11-18T09:12:34-08:00September 20th, 2016|Categories: Articles|Tags: , , , , , , , , |

New Context’s partner, Soltra, was recently featured in an article on the value of cyber threat data sharing. “A new wrinkle offers hope. U.S. Bank and other institutions have begun using technology known as Soltra to generate machine-readable cyberthreat alerts that can automatically trigger actions in security software. This should [...]

31 08, 2016

Beyond Self-Driven Collisions: Real Risk Lies in Cyberthreats to Autonomous Systems

By |2016-10-24T19:43:23-07:00August 31st, 2016|Categories: Articles|Tags: , , , , , , |

Image via Pixabay.com As we march down the path of autonomous vehicles, both on the roads and in the air, collisions remain the dominant security issue of the news cycle. While we certainly want vehicles to avoid collisions whenever possible, we need to sound a much different alarm: [...]

23 08, 2016

New Context Partners with Soltra to Build the Industry’s Next Platforms for Cybersecurity Threat Sharing

By |2016-10-24T19:43:23-07:00August 23rd, 2016|Categories: News & Press Releases|Tags: , , , , , , |

August 22, 2016 12:39 PM Eastern Daylight Time SAN FRANCISCO--(BUSINESS WIRE)--Soltra, the leading provider of cybersecurity threat intelligence (CTI) sharing platforms, and New Context, a product development studio that automates the orchestration, protection and governance of critical infrastructure, today announced their partnership to create the next generation of CTI sharing [...]

Load More Posts
Go to Top