Skip to main content

Introducing Northumbria

Hello, welcome to Northumbria Tools, aka North Tools.

Organize your cyber threat intelligence to enhance and disseminate key, effective insights with the Northumbria threat intelligence platform.

Collect, Enrich, Fuse and Analyze

Gain a comprehensive view of threats from all angles and enhance decision-making while fighting to gain time to mitigate and stop threats as they mature.

  • Organize collected threat data, transforming raw data ito actionable insights.
  • Correlate and connect threat data, mapping information to operational activity to fashion crucial insights while defining collection gaps.
  • Enhance sharing among analysts and the dissemination of key insights across teams and tools.

Our Approach

North Tools believes analysis should be separated from collection and reporting. That a strongly functioning intelligence platform supports careful, curated analysis of threat data using strongly typed viewed through the lenses of structured analytic processes.

Data Standards

Northumbria purposely doesn't use the STIX data schema. While well-intentioned and with its uses, STIX represents a line of thought too strongly focused on malware and compromise, failing utterly to capture the larger corpus of actitivity that precedes it.

Operational Phases

In a cyber operation, there are phases that occur, moving from operation conception to operational action. These phases each contain a serial chain of logically connected activities aimed at a singular or cumulative goal.