-
For the Meta Model, it appears that ALE calculations are a Sum of all downstream models, instead of an Average, I am unsure if this is FAIR-esque but it feels like it should be an Average across all p…
-
I've noticed that all of the pre-supplied templates come with docker-support.
Is there any documentation available on adding, and enabling external connectors without docker?
I'm running a stand…
-
# Summary
If the user tries to create a project that has access to the namespace where Argo CD is installed, we should present some kind of warning.
Update: for users with update or delete acces…
-
### PROBLEM
Recognizing that two different Objects (with different Object IDs but both containing the same internal data) are related is currently outside the scope of STIX. This lack of guidance on …
-
Some may consider it part of the vulnerability disclosure policy, but I think there is a separate policy needed on exposing proprietary or PII data in OASIS-maintained github repos. The vulnerability …
-
## Description
Currently, an O365 rule exists to detect the creation of an Inbox Rule that forwards or redirects mail.
We have had multiple incidents related to Inbox Rule creations that have not be…
-
**Enhancement: APT Hub - Threat Actor Profiling and Campaign Tracking**
======================================================
**Description:**
The APT Hub aims to provide a comprehensive view …
-
## Description
My worker node can't communicate with manager node. My connectors containers don't startup whenever they are on the worker node. I created overlay network, forced default docker brid…
-
@jonstokes , Thank you for taking the time to put this proposal together. I'm a rabidly pro-gun individual but also a pragmatist who knows that simply keeping the status quo will not be able to stand …
-
# Feature request
### What new feature do you want?
When it comes to threat hunting, logons success and failed logons happens every day but logons from invalid or disabled user accounts sh…