Home » 2016 » April

THREAT INTELLIGENCE: STIX 2.0

THREAT INTELLIGENCE: STIX 2.0

In the cyber world the evidence that we see are the artifacts that show up on end-points (computers, email servers, smartphones, industrial control system devices, etc.) and on our networks (routers, firewalls and DNS servers, etc.).

CYBER RESILIENCE

CYBER RESILIENCE

How do we define cyber resiliency?  MITRE’s Homeland Security Systems Engineering and Development Institute has been conducting a multi-year project to define resiliency and to build tools and programs to support regions in their efforts to attain resiliency.  CRI supported that effort throughout 2016.   To begin with, cyber resilience was defined as …a recognition […]