Expanding Automated Threat Hunting and Response with Open DXL
Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are...
OpenDXL Case Study: Sandbox Mania featuring Cuckoo and Wildfire
This blog was written by Barbara Kay. To unleash creativity, my middle school art teacher occasionally offered up all the...
How Working Together Accelerates Our Evolution
This blog post was written by Vincent Weafer. It is no secret that the end goal for cybersecurity companies is...
Mission Made Possible: The Open Integration Time Machine
This blog was written by Barbara Kay. A fast-forward button for integration to a unified security architecture. One of the...
It starts with architecture – DXL enhances the approach
Today’s digital world is drastically different than it was 10 years ago. It is arguably, drastically different than it was...
Defense Evolved: From Threat Intelligence, to Investigation, to Orchestration with DXL
In my last post, I discussed the attributes of our adversaries, the drivers behind their activities, and their recent attack...
Chance of a Lifetime
This blog was written by Brian Dye. Writing from the FOCUS 16 Security Conference, Wed., Nov. 2 I just came...
Shiny Meets Sustainable: OpenDXL as an Orchestration Platform
This blog was written by Barbara Kay. Every now and then I get into a debate about what constitutes a...
Paranoia, OpenDXL, and the Second Economy
This blog was written by Barbara Kay. You are not paranoid. They are out to get you. McAfee research showed...