Categories: Anti-malware

STIX and TAXII: New weapons in the security battle

They may sound like a German noble family, but STIX and TAXII are new tools for fighting internet lawlessness. They enable the good guys to beat internet attacks through automated, realtime info sharing, and are supported by many tech heavyweights. Here’s what you need to know.

 

                                  

 

By Robin Harris 

 

The scenario is depressing and all too common: the Bad Guys — state actors, criminal gangs, script-kiddies — launch an attack, make off with a bundle, and then repeat the attack dozens, perhaps hundreds of times. How does that happen?

 

It happens because the Good Guys aren’t communicating the details of the threat and the actions needed to defeat it. A guy at a NOC might call his colleague and warn him, or tell his security vendor to update their profiles, but that’s about it.

 

I spoke to Brett Jordan of Symantec, editor of the STIX spec and co-chair for TAXII, about how STIX and TAXII aim to change that. They’re two standards whose development is supported by the major security industry players, including IBM, HPE, Cisco, and Dell, large financial institutions, and the US government, including the Department of Defense and the NSA.

 

Full Article

Take a look at the best antivirus, anti-malware, anti-spy, etc. software

Powered by WPeMatico

admin

Recent Posts

Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme

The head of counterintelligence for a division of the Russian Federal Security Service (FSB) was… Read More

5 days ago

Who Stole 3.6M Tax Records from South Carolina?

For nearly a dozen years, residents of South Carolina have been kept in the dark… Read More

2 weeks ago

Crickets from Chirp Systems in Smart Lock Key Leak

The U.S. government is warning that “smart locks” securing entry to an estimated 50,000 dwellings… Read More

2 weeks ago

Why CISA is Warning CISOs About a Breach at Sisense

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach… Read More

2 weeks ago

Twitter’s Clumsy Pivot to X.com Is a Gift to Phishers

On April 9, Twitter/X began automatically modifying links that mention “twitter.com” to read “x.com” instead.… Read More

2 weeks ago

April’s Patch Tuesday Brings Record Number of Fixes

If only Patch Tuesdays came around infrequently — like total solar eclipse rare — instead… Read More

3 weeks ago