TMCnet News

threatTRANSFORM Open Source App Jumpstarts STIX-Based Threat Data Classification
[April 28, 2014]

threatTRANSFORM Open Source App Jumpstarts STIX-Based Threat Data Classification


(Marketwire Via Acquire Media NewsEdge) SAN JOSE, CA -- (Marketwired) -- 04/29/14 -- Creators of threatTRANSFORM (www.threattransform.com) announced the release of the open source application designed to streamline the creation, compiling, and publishing of STIX datasets. Anyone struggling to manage security event classification can utilize the free open source threatTRANSFORM application to improve their MSSP, SIEM, and other big data cyber threat intelligence, management, and response programs with the industry standard framework -- Structured Threat Information eXpression (STIX™).



STIX is designed for cyber threat analysts, malware analysts, security vendors, and information security practitioners in defending networks and systems against cyber threats. STIX provides a common language for describing cyber threat information for sharing, storing, and otherwise using a consistent manner that facilitates automation. threatTRANSFORM allows organizations to begin classifying threat data in an industry-standard way for consistent reporting, analysis, and sharing.

"We've been working with the open source version of threatTRANSFORM from the very beginning and totally support their commitment to opening it up to everyone -- we're using threatTRANSFORM to integrate our real-time cyber attack intelligence into threat platforms," said Maurits Lucas, InTELL Business Director at FOX-IT. "For us it was more than the ground-breaking work in using STIX in web platforms and the excellent framework they provide; the threatTRANSFORM guys have provided great support and advice which has helped us to scale our own unique InTELL portal content across multiple continents." threatTRANSFORM was created by Brad Lindow, Timothy Plocinski, and Demetrios Lazarikos (Laz). Based on the MIT Open Source License, threatTRANSFORM was created for streamlining the creation of STIX datasets. Everything from analyzing complex information to sifting through machine data, the threatTRANSFORM application provides a powerful template engine. threatTRANSFORM is free and works in nearly any web server -- it's a quick way to jumpstart working with STIX.


"We'd previously been using a proprietary mechanism of data exchange," said Rich Reybok, SVP of Engineering for Vorstack. "threatTRANSFORM has really helped us to quickly transition to a preferred STIX standards based method of describing cyber threat information between customers, aiding product adoption." threatTRANSFORM was built from the ground up for the end user and developer extending the cyber intelligence application code. To begin integrating threatTRANSFORM and take control of your STIX data, please visit http://www.threattransform.com.

About Blue Lava Consulting and Blue Lava LabsBlue Lava Consulting, and Blue Lava Labs, are proud sponsors of the threatTRANSFORM open source project and application.

Blue Lava Consulting works in a strategic partnership with organizations to assess IT Security programs, IT risks, and build an efficient set of IT Security and Fraud solutions. Blue Lava experience in providing IT Security coaching, IT risk management, and research allows the company to tailor strategies in delivering superior results with the optimum balance of business resiliency and agility. Blue Lava is disciplined to work with organizations in providing a detailed and comprehensive knowledge transfer through engagements. For more information, please visit http://www.blue-lava.net.

Add to Digg Bookmark with del.icio.us Add to Newsvine threatTRANSFORM PR Contact Demetrios Lazarikos (Laz) Email: Email Contact Source: Blue Lava Consulting

[ Back To TMCnet.com's Homepage ]