Cosive is a specialist in incident response and threat intelligence.
We have expert knowledge of CSIRTs and SOCs, and we understand your pain points. We will help you optimise your processes and tools, using our comprehensive knowledge of the best commercial and open source tools available to find the best solution for your needs.
If the perfect tool doesn’t exist yet, we are also highly adept and experienced in building and integrating bespoke tools tailored just for you.
We help your security team focus on what's important!
We've partnered with world-leaders in threat intel.
Manage your threat intel with the EclecticIQ Platform. EclecticIQ's flagship Threat Intelligence Platform (TIP) enables automated security information exchange, empowers collaborative analyst workflow and ensures timely integration of cyber threat intelligence detection, prevention and response capabilities. Cosive provides consulting, integration and support for the EclecticIQ Platform in Australia, New Zealand and the Asia Pacific region.
Automate and orchestrate your security operations with the Phantom Platform. The Phantom Platform integrates your existing security technologies, providing a layer of connective tissue between them. It supercharges your Security Operations Center (SOC) by automating repetitive tasks and orchestrating multiple concurrent workflows.
Responding to incidents quickly is key. Attackers automate their attacks, giving them ample time to steal your information. We help you react faster and integrate your tooling to detect attackers that would otherwise be missed. The faster you can find them, the faster you can take action.
The problem today is not finding sources of Threat Intelligence, but rather organizing it and making it actionable. We give you the power to understand your intel, and make the most of your investment.
Shouldn't your security tools give you the ability to answer your questions rather than complicate your investigations? We think so. That's why we provide tools that give you the answers you want.
Smart organizations realize that prevention alone doesn't work - detection and response are required for an organization to really defend itself. We can show you how to develop a detection and response capability and the best way to integrate it into your organization so you get the most value from it.
There is a global shortage of competent Security Operations personnel, yet the number of security attacks faced by organizations is ever increasing. We can show you how the latest technologies and smart automation can help you sort the things you need to care about from the things you don't.
Find things others don't. Integrating and automating your security operations allows your organization to use more effective analysis methods to find the scenarios that matter.
Structured Threat Information eXpression (STIX™) is a format for sharing Threat Intelligence. It is an OASIS standard, and has been developed intensively since early 2010. Cosive team members have been directly involved with the development of STIX, and its close cousins TAXII, CybOX and MAEC since 2012.
We believe that STIX is the best way for organizations to crowdsource their threat information, and have spent a lot of our energy improving it as much as we can.
We were looking for a way that we could giveback to the community, and help other vendors embrace STIX. We noticed that one of the main hinderances was the lack of example STIX content. So we developed the STIX Data Generator.
Anyone can use the STIX Data Generator to produce sample STIX content for free. We hope that everyone does.
On this website, we collect limited personal information from you. We keep your information reasonably secure. We do disclose it to others but only for the purposes of web site analytics and mailing list administration. These other parties are listed below.
You are able to amend or delete your personal information held by the site, primarily for our mailing list. Please see the unsubscribe instructions.
If you wish, you can contact the person responsible for privacy on this Web site.
As a small business, we are exempted from the operation of the Privacy Act. However, protection of your personal information that we collect is very important to us. This policy sets out how we handle any personal information we collect or receive about you.
We use the definition of personal information contained in s 6(1) of the Privacy Act. It states that personal information is 'information or an opinion (including information or an opinion forming part of a database), whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion'.Collection of personal information
We try to collect personal information directly from the individual for the purposes of email contact and .
We only collect personal information for purposes which are directly related to our activities and only when it is necessary for or directly related to such purposes. These purposes include:
When you only browse the website, we do not collect your personal information.
When you look at our website, Google Analytics and our internet service provider makes a record of your visit and logs (in server logs) the following information for statistical purposes:
We do not identify you or your browsing activities except, in the event of an investigation, where a law enforcement agency may exercise a warrant to inspect the internet service provider's server logs.Cookies
We disclose personal information to third parties. A list of these third parties can be found here. We only use personal information for the purposes for which it was given to us, or for purposes which are directly related to one of our activities, and we do not give it to other organisations or anyone else unless one of the following applies:
We take steps to ensure that the personal information we collect is accurate, up to date and complete. These steps include maintaining and updating personal information when we are advised by you that your personal information has changed.Data security
We take steps to protect the personal information we hold against loss, unauthorised access, use, modification or disclosure and against other misuse. These steps include password protection for electronic files, securing paper files in locked cabinets and physical access restrictions.
If you choose to join our email lists, complete online forms or lodge enquiries, your contact details are stored in password-protected databases.Deletion of data and unsubscribing
When you cease to be a member of our website, we will destroy your personal information in a secure manner or delete it. You can request that your personal information be deleted at any time.
You may also request us to delete any personal information we hold about you by emailing our contact person whose details are below. You may choose to opt out of further contact from us by sending us an email containing the word ‘unsubscribe’ in the title of the email.Access and correction
If you wish to request access to the personal information we hold about you, or request that we change that personal information, we will allow access or make the changes unless we consider that there is a sound reason to withhold the information under relevant law such as the Privacy Act, Freedom of Information Act 1982 (Cth) (FOI Act) or other relevant information.
You can obtain further information about how to request access or changes to the information we hold about you by contacting us (see details below).How to contact us
Google Analytics is a free service provided by Google for the purpose of gathering statistical information about visitors to a website. This information generally includes IP addresses, geographical location of the IP address, pages visited, how the visitor arrived at the webpage and computer information, such as the operating system and browser being used. Google Analytics is implemented through a cookie which is placed on the visitor's computer coupled with code in the webpage which collects visitor data and relays it to Google's servers for processing.
The Cosive team actively participates and contributes to the security community, including presenting at as many conferences as we're able. We hope you find these presentations useful.
We present at many conferences and community meetups. If you'd like us to present at your event then please drop us a line!
Cosive knows security operations and threat intelligence inside out. We've developed a range of training courses that will help you tap into our expertise and get up to speed fast.
If you like to attend any of these training courses then please drop us a line! Or if you'd like us to run any of these training courses at your conference or corporate event then please also get in touch! We're here to help.