Blog Post

October 31, 2022

Fun with and the Kestrel PowerShell Deobfuscator

Ready-made datasets from the Open Threat Research Forge meet Kestrel, featuring PowerShell Empire!
June 20, 2022

Open Cybersecurity Alliance Event Drives Industry Collaboration During RSA 2022

Last week I had the pleasure to be back at RSA after a 2-year hiatus. The energy of the security community was infectious – you could feel it not only on the show floor and in each of the sessions, but also on the road, the restaurants, and more! It was great to see the security community – vendors, practitioners, […]
May 31, 2022

OCA joins Nonprofit Cyber Coalition

OCA becomes an active member of the Nonprofit Cyber Coalition.
January 7, 2022

Open Cybersecurity Alliance: Solving the security interoperability challenge

The open-source community is looking to solve one of the biggest security challenges organizations face today: ensuring their tools can integrate with each other seamlessly.
November 2, 2021

Setting Up The Open Hunting Stack in Hybrid Cloud With Kestrel and SysFlow

How to set up the open hunting stack as presented at Black Hat Europe 2021 Arsenal.
October 30, 2021

Zero Trust Working Group forms at Open Cyber Security Alliance

The seemingly endless stream of supply chain exploitation and ransomware disruptions have made it painfully clear that malware is already inside the perimeter, and has been there – undetected – for some time. With mounting pressure to address this issue, a significant number of regulatory and standards efforts have begun to consider Zero Trust as part of the answer. With […]
October 29, 2021

XDR: A Blessing for SOC Teams, or Another Fad?

The security industry has evolved over the years to combat new and emerging cyber threats, and as we evolved, new products were launched to help security teams. Some of these products have been great breakthroughs – driven by the venture capital and innovation flowing to the security industry – but a lot of them have been a fad as they […]
October 18, 2021

Federated Search

Visibility is an ongoing problem for security operations. Throughout an investigation, many tools are utilized to gather and collect the context needed to make informed decisions. That context is critical to advise security teams on what actions to take and what potential threats require further research. Gathering information across multiple tools and disparate data sources takes time, and time is […]