threatTRANSFORM Open Source App Jumpstarts STIX-Based Threat Data Classification

Top Quote The creators of threatTRANSFORM today announced the release of their open source application designed to streamline the creation, compiling, and publishing of STIX datasets. End Quote
  • (1888PressRelease) May 04, 2014 - San Jose, CA -- The creators of threatTRANSFORM ( today announced the release of their open source application designed to streamline the creation, compiling, and publishing of STIX datasets. Anyone struggling to manage security event classification can utilize the free open source threatTRANSFORM application to improve their MSSP, SIEM, and other big data cyber threat intelligence, management and response programs with the industry standard framework - Structured Threat Information eXpression (STIX™).

    STIX is designed for cyber defenders, cyber threat analysts, malware analysts, security vendors, and information security practitioners in defending their networks and systems against cyber threats. STIX provides a common language for describing cyber threat information so it can be shared, stored, and otherwise used in a consistent manner that facilitates automation. threatTRANSFORM allows organizations to begin classifying threat data in an industry-standard way for consistent reporting, analysis and sharing.

    "We've been working with the open source version of threatTRANSFORM from the very beginning and totally support their commitment to opening it up to everyone - we're using threatTRANSFORM to integrate our real-time cyber attack intelligence into threat platforms," said Maurits Lucas, InTELL Business Director at FOX-IT. "For us it was more than the ground-breaking work in using STIX in web platforms and the excellent framework they provide; the threatTRANSFORM guys have provided great support and advice which has helped us to scale our own unique InTELL portal content across multiple continents."

    threatTRANSFORM was created in 2014 by Brad Lindow, Timothy Plocinski, and Demetrios Lazarikos (Laz). Based on the MIT Open Source License, threatTRANSFORM was created out of the need for streamlining the creation of STIX datasets. Everything from analyzing complex information to sifting through machine data, the threatTRANSFORM application provides a powerful template engine. threatTRANSFORM is open source, free and works in nearly any web server. It's the quickest way to get going with STIX today.

    "We'd previously been using a proprietary mechanism of data exchange," said Rich Reybok, SVP of Engineering for Vorstack. "threatTRANSFORM has really helped us to quickly transition to a preferred STIX standards based method of describing cyber threat information between customers, aiding product adoption."

    threatTRANSFORM has been built from the ground up for ease-of-use, both for the end user and the developer extending the cyber intelligence application code. To begin integrating threatTRANSFORM and take control of your STIX data, please visit

    About STIX:
    The Structured Threat Information eXpression (STIX™) is a language for describing cyber threat information in a standardized and structured manner. STIX characterizes an extensive set of cyber threat information, to include indicators of adversary activity (e.g., IP addresses and file hashes) as well as additional contextual information regarding threats (e.g., adversary Tactics, Techniques and Procedures [TTPs]; exploitation targets; Campaigns; and Courses of Action [COA]) that together more completely characterize the cyber adversary's motivations, capabilities, and activities, and thus, how to best defend against them. For more information, please visit

    About Blue Lava Consulting and Blue Lava Labs:
    Blue Lava Consulting, and Blue Lava Labs, are proud sponsors of the threatTRANSFORM open source project and application.

    Blue Lava Consulting works in a strategic partnership with organizations to assess IT Security programs, IT risks, and build an efficient set of IT Security and Fraud solutions. Blue Lava experience in providing IT Security coaching, IT risk management, and research allows the company to tailor strategies in delivering superior results with the optimum balance of business resiliency and agility. Blue Lava is disciplined to work with organizations in providing a detailed and comprehensive knowledge transfer through engagements. For more information, please visit

    threatTRANSFORM PR Contact:
    Demetrios Lazarikos (Laz)
    Email: press ( @ ) threattransform dot com

  • FB Icon Twitter Icon In-Icon
Contact Information