23 04, 2018

Can the Law Stop Ransomware?

By |2019-10-22T14:09:05-07:00April 23rd, 2018|Categories: Articles|Tags: , , |

The vulnerability of energy and critical infrastructure to cyberattack poses a national security risk. New Context CEO Daniel Riedel was quoted in US News today, commenting-on the growing risk of cyberattack in critical infrastructure, including water, power and telecommunication systems. Alan Neuhauser reports that “lawmakers across the U.S. have [...]

14 02, 2018

Defending Your Network with Cyber Threat Intelligence Sharing

By |2019-10-22T14:10:03-07:00February 14th, 2018|Categories: Articles|Tags: , , |

The accelerating flood of software vulnerabilities and innovative attack techniques are leaving increasingly fewer organizations capable of defending themselves and safeguarding sensitive data in their care. I recently co-authored an op-ed with Thomas Schreck (FIRST Board Chair and Head of Siemens CERT), wherein we discuss the benefits and [...]

28 11, 2017

New Context to Present on STIX Patterning at Borderless Cyber in Prague

By |2018-08-21T09:03:35-07:00November 28th, 2017|Categories: Events|Tags: , , , , , , , |

STIX Patterning is perhaps the most innovative addition to STIX 2.0, yet it is poorly understood. STIX Patterning is the language in which IOCs are conveyed in STIX 2.0 Indicators. But STIX Patterning targets much more than IOCs. Join Us Join us for the Cyber Threat Intelligence Matters Borderless [...]

30 05, 2017

Cyber Threat Intelligence: Borderless Cyber and Beyond

By |2019-11-18T09:11:01-08:00May 30th, 2017|Categories: Articles, Events|Tags: , , , , , , |

At New Context, we have long been committed to cyber threat intelligence (CTI), particularly as it relates to defining, sharing and automating information about threats. It should come as no surprise, then, that in June we will be on-site in New York City as sponsors of OASIS’ Borderless Cyber Conference. [...]

20 04, 2017

Attribution in Code: looking to the future of building stronger software

By |2019-09-12T10:45:52-07:00April 20th, 2017|Categories: Articles|Tags: , , , , |

Image via Wikipedia Commons Earlier this year, I explored how important attribution is within critical infrastructure systems, so that we can understand, without a doubt, all actors and their actions within these important environments. We do this by auditing every interaction of an actor in the ecosystem and [...]

10 02, 2017

How to Build DevOps Momentum

By |2019-10-22T14:07:33-07:00February 10th, 2017|Categories: Articles, Tips & Tricks|Tags: , , , , , , |

For all of its challenges, 2016 was a year of inspiring innovation. SpaceX proved we can have reusable rockets by taking a page from a science fiction book and launching a rocket then landing it vertically on a moving boat. Enter a new era of space travel. Tesla sent all [...]

22 11, 2016

Why Every Business Should Embrace Automated Threat Response

By |2018-01-19T21:03:44-08:00November 22nd, 2016|Categories: Articles|Tags: , , , , |

Image via Pixabay When it comes to information sharing in the workplace, it’s truly astounding to see how far the industrial world has come in recent years. Today, virtually every department in a company can access, analyze, and share information like never before — which is unlocking huge [...]

25 10, 2016

Security for Startups in a DevOps World Webinar Follow-up

By |2019-09-12T10:48:27-07:00October 25th, 2016|Categories: Articles, Webinar|Tags: , , , , , |

On October 18, Ben Tomhave, Security Architect for New Context talked about using Lean Security practices to integrate automated security into your DevOps processes and how to embed security practices into your company’s core culture. Didn’t have time to join us for our webinar? No worries! We know you’re busy! We [...]

18 10, 2016

How To Talk About Security With Every C-Suite Member

By |2016-10-31T22:14:22-07:00October 18th, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , |

Image via Pixabay.com Communicating with C-Suite leaders about the ongoing security threats your company faces can easily turn into an exercise in futility. Their eyes glaze over as you present metrics and charts that illustrate the current state of the business’s IT infrastructure, and your attempts to justify [...]

4 10, 2016

New Context Appoints Azadeh Ghiasvand Vice President, Engineering

By |2016-10-24T19:43:23-07:00October 4th, 2016|Categories: News & Press Releases|Tags: , , , , |

SAN FRANCISCO – October 4, 2016 - New Context, the leading provider of Lean Security for software and infrastructure development, today announced that the company has appointed Azadeh Ghiasvand, a 25-year veteran of Silicon Valley, as vice president of engineering. “As the newest addition to our team, Azadeh will leverage [...]

Load More Posts
Go to Top