Welcome!

News Feed Item

threatTRANSFORM Open Source App Jumpstarts STIX-Based Threat Data Classification

SAN JOSE, CA -- (Marketwired) -- 04/29/14 -- Creators of threatTRANSFORM (www.threattransform.com) announced the release of the open source application designed to streamline the creation, compiling, and publishing of STIX datasets. Anyone struggling to manage security event classification can utilize the free open source threatTRANSFORM application to improve their MSSP, SIEM, and other big data cyber threat intelligence, management, and response programs with the industry standard framework -- Structured Threat Information eXpression (STIX™).

STIX is designed for cyber threat analysts, malware analysts, security vendors, and information security practitioners in defending networks and systems against cyber threats. STIX provides a common language for describing cyber threat information for sharing, storing, and otherwise using a consistent manner that facilitates automation. threatTRANSFORM allows organizations to begin classifying threat data in an industry-standard way for consistent reporting, analysis, and sharing.

"We've been working with the open source version of threatTRANSFORM from the very beginning and totally support their commitment to opening it up to everyone -- we're using threatTRANSFORM to integrate our real-time cyber attack intelligence into threat platforms," said Maurits Lucas, InTELL Business Director at FOX-IT. "For us it was more than the ground-breaking work in using STIX in web platforms and the excellent framework they provide; the threatTRANSFORM guys have provided great support and advice which has helped us to scale our own unique InTELL portal content across multiple continents."

threatTRANSFORM was created by Brad Lindow, Timothy Plocinski, and Demetrios Lazarikos (Laz). Based on the MIT Open Source License, threatTRANSFORM was created for streamlining the creation of STIX datasets. Everything from analyzing complex information to sifting through machine data, the threatTRANSFORM application provides a powerful template engine. threatTRANSFORM is free and works in nearly any web server -- it's a quick way to jumpstart working with STIX.

"We'd previously been using a proprietary mechanism of data exchange," said Rich Reybok, SVP of Engineering for Vorstack. "threatTRANSFORM has really helped us to quickly transition to a preferred STIX standards based method of describing cyber threat information between customers, aiding product adoption."

threatTRANSFORM was built from the ground up for the end user and developer extending the cyber intelligence application code. To begin integrating threatTRANSFORM and take control of your STIX data, please visit http://www.threattransform.com.

About Blue Lava Consulting and Blue Lava Labs
Blue Lava Consulting, and Blue Lava Labs, are proud sponsors of the threatTRANSFORM open source project and application.

Blue Lava Consulting works in a strategic partnership with organizations to assess IT Security programs, IT risks, and build an efficient set of IT Security and Fraud solutions. Blue Lava experience in providing IT Security coaching, IT risk management, and research allows the company to tailor strategies in delivering superior results with the optimum balance of business resiliency and agility. Blue Lava is disciplined to work with organizations in providing a detailed and comprehensive knowledge transfer through engagements. For more information, please visit http://www.blue-lava.net.

Add to Digg Bookmark with del.icio.us Add to Newsvine

threatTRANSFORM PR Contact
Demetrios Lazarikos (Laz)
Email: Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
Given the popularity of the containers, further investment in the telco/cable industry is needed to transition existing VM-based solutions to containerized cloud native deployments. The networking architecture of the solution isolates the network traffic into different network planes (e.g., management, control, and media). This naturally makes support for multiple interfaces in container orchestration engines an indispensable requirement.
In their session at @DevOpsSummit at 21st Cloud Expo, Michael Berman, VP Engineering at TidalScale, and Ivo Jimenez, Engineer at TidalScale, will describe how automating tests in TidalScale is easy thanks to WaveRunner. They will show how they use WaveRunner, Jenkins, and Docker to have agile delivery of TidalScale. Michael Berman is VP Engineering at TidalScale. TidalScale is developing a scale up compute and resource architecture for customers to perform big data exploration and real time anal...
Your homes and cars can be automated and self-serviced. Why can't your storage? From simply asking questions to analyze and troubleshoot your infrastructure, to provisioning storage with snapshots, recovery and replication, your wildest sci-fi dream has come true. In his session at @DevOpsSummit at 20th Cloud Expo, Dan Florea, Director of Product Management at Tintri, provided a ChatOps demo where you can talk to your storage and manage it from anywhere, through Slack and similar services with...
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...