An Asymmetric Cyber Strategy
Iran is no stranger to propaganda. The Islamic Republic owes its existence in part to the distribution of cassette tapes with the recorded speeches of Ayatollah Khomeini. These were smuggled…
Iran is no stranger to propaganda. The Islamic Republic owes its existence in part to the distribution of cassette tapes with the recorded speeches of Ayatollah Khomeini. These were smuggled…
The specifications, defining a free, open language for describing and exchanging cyber threat intelligence, enters the 60-day public review that precedes the call for consent as an OASIS Standard. OASIS…
Beginninng in mid-December, 2020 a threat actor group launched a wide-spread attack targeting Linux and Windows operating systems by dropping an XMRig Miner on targeted sites. An analysis of the…
As more cyber threat intelligence teams become established, and members of Information Sharing and Analysis Organizations (ISAOs) begin to realize the benefits of threat intelligence sharing for fortifying their networks…
The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare…
The OASIS Cyber Threat Intelligence Technical Committee (CTI TC) passed the ballots for STIX 2.0 and TAXII 2.0 in July, 2017. OASIS staff is currently finalizing the documents to ensure…