IBM Security Join our 16,000+ members as we work together to overcome the toughest challenges of cybersecurity. Join the Community
Over time, organizations like yours, have added various security point products to solve a ‘problem.’ IBM data shows that an average large organization may have as many as 85 products from 40 different vendors – making security a complicated task. Often products are purchased and used for a single point solution, even though they have much more robust capabilities. It’s no wonder security professionals are overwhelmed with these multiple data lakes. Structured Threat Information eXpression (STIX™) is a language and serialization format that organizations can use to exchange cyber threat intelligence (CTI). STIX-Shifter is an open source Python library that uses STIX Cyber Observables to enable software to connect to products that house cybersecurity data repositories. Watch this session to learn more about Stix Shifter and how you as an end user can use Stix Shifter as a method to script searches and/or queries as part of your threat hunting and orchestration workflows, as well as how this library can be used to automate data collection in your security operations center.